The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:8721 https://access.redhat.com/errata/RHSA-2024:8721
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:8720 https://access.redhat.com/errata/RHSA-2024:8720
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:8724 https://access.redhat.com/errata/RHSA-2024:8724
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:8723 https://access.redhat.com/errata/RHSA-2024:8723
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:8725 https://access.redhat.com/errata/RHSA-2024:8725
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:8722 https://access.redhat.com/errata/RHSA-2024:8722
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2024:8727 https://access.redhat.com/errata/RHSA-2024:8727
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:8728 https://access.redhat.com/errata/RHSA-2024:8728
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8729 https://access.redhat.com/errata/RHSA-2024:8729
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:8726 https://access.redhat.com/errata/RHSA-2024:8726
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8790 https://access.redhat.com/errata/RHSA-2024:8790
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:8793 https://access.redhat.com/errata/RHSA-2024:8793
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:9016 https://access.redhat.com/errata/RHSA-2024:9016
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:9019 https://access.redhat.com/errata/RHSA-2024:9019
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:9017 https://access.redhat.com/errata/RHSA-2024:9017
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:9015 https://access.redhat.com/errata/RHSA-2024:9015
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:9018 https://access.redhat.com/errata/RHSA-2024:9018
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9552 https://access.redhat.com/errata/RHSA-2024:9552
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9554 https://access.redhat.com/errata/RHSA-2024:9554