Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Oct 2024 15:59:27 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP.
Message-ID:  <bug-281992-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D281992

            Bug ID: 281992
           Summary: www/firefox: 0day 9.8 score CVE-2024-9680 upgrade
                    ASAP.
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: gecko@FreeBSD.org
          Reporter: tomek@cedro.info
             Flags: maintainer-feedback?(gecko@FreeBSD.org)
          Assignee: gecko@FreeBSD.org

An attacker was able to achieve code execution in the content process
by exploiting a use-after-free in Animation timelines. We have had
reports of this vulnerability being exploited in the wild. This
vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and
Firefox ESR < 115.16.1.

https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/
https://nvd.nist.gov/vuln/detail/CVE-2024-9680

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-281992-7788>