{"id":"MGASA-2024-0049","summary":"Updated rootcerts, nss and firefox packages fix security vulnerabilities","details":"The updated packages fix security vulnerabilities:\nTiming attack against RSA decryption in TLS. (CVE-2023-5388)\nOut-of-bounds memory read in networking channels. (CVE-2024-1546)\nAlert dialog could have been spoofed on another site. (CVE-2024-1547)\nFullscreen Notification could have been hidden by select element.\n(CVE-2024-1548)\nCustom cursor could obscure the permission dialog. (CVE-2024-1549)\nMouse cursor re-positioned unexpectedly could have led to unintended\npermission grants. (CVE-2024-1550)\nMultipart HTTP Responses would accept the Set-Cookie header in response\nparts. (CVE-2024-1551)\nIncorrect code generation on 32-bit ARM devices. (CVE-2024-1552)\nMemory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and\nThunderbird 115.8. (CVE-2024-1553)\n","modified":"2026-04-16T04:42:28.077012542Z","published":"2024-02-27T01:08:24Z","upstream":["CVE-2023-5388","CVE-2024-1546","CVE-2024-1547","CVE-2024-1548","CVE-2024-1549","CVE-2024-1550","CVE-2024-1551","CVE-2024-1552","CVE-2024-1553"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2024-0049.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32876"},{"type":"WEB","url":"https://www.mozilla.org/en-US/firefox/115.8.0/releasenotes/"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/"},{"type":"WEB","url":"https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html"}],"affected":[{"package":{"name":"rootcerts","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/rootcerts?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20240215.00-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0049.json"}},{"package":{"name":"nss","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.98.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0049.json"}},{"package":{"name":"firefox","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.8.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0049.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.8.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0049.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}