CVE-2024-7652 – mozilla: Type Confusion in Async Generators in Javascript Engine
https://notcve.org/view.php?id=CVE-2024-7652
An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. ... The Mozilla Foundation Security Advisory describes this flaw as follows: An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. • https://bugzilla.mozilla.org/show_bug.cgi?id=1901411 https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r https://www.mozilla.org/security/advisories/mfsa2024-29 https://www.mozilla.org/security/advisories/mfsa2024-30 https://www.mozilla.org/security/advisories/mfsa2024-31 https://www.mozilla.org/security/advisories/mfsa2024-32 https://access.redhat.com/security/cve/CVE-2024-7652 https://bugzilla.redhat.com/show_bug.cgi?id=2310490 • CWE-476: NULL Pointer Dereference CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2024-6119 – Possible denial of service in X.509 name checks
https://notcve.org/view.php?id=CVE-2024-6119
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. • https://openssl-library.org/news/secadv/20240903.txt https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0 https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2 https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6 https://access.redhat.com/security/cve/CVE-2024-6119 https://bugzilla.redhat.com/show_bug.cgi?id=2306158 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2024-8385 – mozilla: WASM type confusion involving ArrayTypes
https://notcve.org/view.php?id=CVE-2024-8385
A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. ... A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. ... The Mozilla Foundation's Security Advisory: A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. • https://bugzilla.mozilla.org/show_bug.cgi?id=1911909 https://www.mozilla.org/security/advisories/mfsa2024-39 https://www.mozilla.org/security/advisories/mfsa2024-40 https://www.mozilla.org/security/advisories/mfsa2024-43 https://access.redhat.com/security/cve/CVE-2024-8385 https://bugzilla.redhat.com/show_bug.cgi?id=2309431 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2024-8381 – mozilla: Type confusion when looking up a property name in a "with" block
https://notcve.org/view.php?id=CVE-2024-8381
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. ... A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. ... The Mozilla Foundation's Security Advisory: A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the with environment. • https://bugzilla.mozilla.org/show_bug.cgi?id=1912715 https://www.mozilla.org/security/advisories/mfsa2024-39 https://www.mozilla.org/security/advisories/mfsa2024-40 https://www.mozilla.org/security/advisories/mfsa2024-41 https://www.mozilla.org/security/advisories/mfsa2024-43 https://www.mozilla.org/security/advisories/mfsa2024-44 https://access.redhat.com/security/cve/CVE-2024-8381 https://bugzilla.redhat.com/show_bug.cgi?id=2309427 • CWE-704: Incorrect Type Conversion or Cast CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2024-8194
https://notcve.org/view.php?id=CVE-2024-8194
Type Confusion in V8 in Google Chrome prior to 128.0.6613.113 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. • https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html https://issues.chromium.org/issues/360533914 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •