By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2024-26/#CVE-2024-5691
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:3952 https://access.redhat.com/errata/RHSA-2024:3952
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:3949 https://access.redhat.com/errata/RHSA-2024:3949
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:3950 https://access.redhat.com/errata/RHSA-2024:3950
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:3953 https://access.redhat.com/errata/RHSA-2024:3953
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3954 https://access.redhat.com/errata/RHSA-2024:3954
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:3955 https://access.redhat.com/errata/RHSA-2024:3955
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:3951 https://access.redhat.com/errata/RHSA-2024:3951
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:3958 https://access.redhat.com/errata/RHSA-2024:3958
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:3972 https://access.redhat.com/errata/RHSA-2024:3972
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:4001 https://access.redhat.com/errata/RHSA-2024:4001
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:4003 https://access.redhat.com/errata/RHSA-2024:4003
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4004 https://access.redhat.com/errata/RHSA-2024:4004
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4002 https://access.redhat.com/errata/RHSA-2024:4002
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4015 https://access.redhat.com/errata/RHSA-2024:4015
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:4016 https://access.redhat.com/errata/RHSA-2024:4016
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:4018 https://access.redhat.com/errata/RHSA-2024:4018
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:4036 https://access.redhat.com/errata/RHSA-2024:4036
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:4063 https://access.redhat.com/errata/RHSA-2024:4063