Date: Thu, 10 Oct 2024 15:59:27 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP. Message-ID: <bug-281992-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D281992 Bug ID: 281992 Summary: www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP. Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: gecko@FreeBSD.org Reporter: tomek@cedro.info Flags: maintainer-feedback?(gecko@FreeBSD.org) Assignee: gecko@FreeBSD.org An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1. https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/ https://nvd.nist.gov/vuln/detail/CVE-2024-9680 --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-281992-7788>