First published: Tue Jul 09 2024(Updated: )
CSP violations generated links in the console tab of the developer tools, pointing to the violating resource. This caused a DNS prefetch which leaked that a CSP violation happened.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <128 | 128 |
Mozilla Firefox | <128 | 128 |
debian/firefox | 131.0.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-6612 is rated as having a moderate severity due to the potential information disclosure through CSP violations.
To fix CVE-2024-6612, update Mozilla Thunderbird or Firefox to version 128 or higher.
CVE-2024-6612 affects Firefox versions up to but not including 128.
CVE-2024-6612 affects Thunderbird versions up to but not including 128.
Yes, the Debian package 'firefox' is affected by CVE-2024-6612 prior to version 131.0.2-2.