Bug 2259933 (CVE-2024-0753)

Summary: CVE-2024-0753 Mozilla: HSTS policy on subdomain could bypass policy of upper domain
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abobrov, erack, jhorak, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 115.7, thunderbird 115.7 Doc Type: ---
Doc Text:
The Mozilla Foundation Security Advisory describes this flaw as: In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2258469    

Description Mauro Matteo Cascella 2024-01-23 20:55:35 UTC
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain.

External Reference:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-02/#CVE-2024-0753

Comment 25 errata-xmlrpc 2024-01-30 11:00:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:0559 https://access.redhat.com/errata/RHSA-2024:0559

Comment 26 errata-xmlrpc 2024-01-30 12:30:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:0565 https://access.redhat.com/errata/RHSA-2024:0565

Comment 27 errata-xmlrpc 2024-01-30 14:09:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0596 https://access.redhat.com/errata/RHSA-2024:0596

Comment 28 errata-xmlrpc 2024-01-30 14:10:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0598 https://access.redhat.com/errata/RHSA-2024:0598

Comment 29 errata-xmlrpc 2024-01-30 14:15:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:0600 https://access.redhat.com/errata/RHSA-2024:0600

Comment 30 errata-xmlrpc 2024-01-30 14:15:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:0601 https://access.redhat.com/errata/RHSA-2024:0601

Comment 31 errata-xmlrpc 2024-01-30 14:16:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0603 https://access.redhat.com/errata/RHSA-2024:0603

Comment 32 errata-xmlrpc 2024-01-30 14:16:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0602 https://access.redhat.com/errata/RHSA-2024:0602

Comment 33 errata-xmlrpc 2024-01-30 14:18:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0604 https://access.redhat.com/errata/RHSA-2024:0604

Comment 34 errata-xmlrpc 2024-01-30 14:18:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0605 https://access.redhat.com/errata/RHSA-2024:0605

Comment 35 errata-xmlrpc 2024-01-30 14:54:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0608 https://access.redhat.com/errata/RHSA-2024:0608

Comment 36 errata-xmlrpc 2024-01-30 14:54:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0609 https://access.redhat.com/errata/RHSA-2024:0609

Comment 37 errata-xmlrpc 2024-01-30 15:21:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:0615 https://access.redhat.com/errata/RHSA-2024:0615

Comment 38 errata-xmlrpc 2024-01-30 15:21:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:0616 https://access.redhat.com/errata/RHSA-2024:0616

Comment 39 errata-xmlrpc 2024-01-30 16:07:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0622 https://access.redhat.com/errata/RHSA-2024:0622

Comment 40 errata-xmlrpc 2024-01-30 16:08:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0623 https://access.redhat.com/errata/RHSA-2024:0623

Comment 41 errata-xmlrpc 2024-01-31 07:07:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2024:0619 https://access.redhat.com/errata/RHSA-2024:0619

Comment 42 errata-xmlrpc 2024-01-31 07:07:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2024:0618 https://access.redhat.com/errata/RHSA-2024:0618