Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:8721 https://access.redhat.com/errata/RHSA-2024:8721
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:8720 https://access.redhat.com/errata/RHSA-2024:8720
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:8724 https://access.redhat.com/errata/RHSA-2024:8724
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:8723 https://access.redhat.com/errata/RHSA-2024:8723
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:8725 https://access.redhat.com/errata/RHSA-2024:8725
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:8722 https://access.redhat.com/errata/RHSA-2024:8722
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2024:8727 https://access.redhat.com/errata/RHSA-2024:8727
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:8728 https://access.redhat.com/errata/RHSA-2024:8728
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8729 https://access.redhat.com/errata/RHSA-2024:8729
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:8726 https://access.redhat.com/errata/RHSA-2024:8726