[Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP.
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP."
- Reply: bugzilla-noreply_a_freebsd.org: "maintainer-feedback requested: [Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP."
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP."
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP."
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP."
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 281992] www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP."
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 10 Oct 2024 15:59:27 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
Bug ID: 281992
Summary: www/firefox: 0day 9.8 score CVE-2024-9680 upgrade
ASAP.
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Many People
Priority: ---
Component: Individual Port(s)
Assignee: gecko@FreeBSD.org
Reporter: tomek@cedro.info
Flags: maintainer-feedback?(gecko@FreeBSD.org)
Assignee: gecko@FreeBSD.org
An attacker was able to achieve code execution in the content process
by exploiting a use-after-free in Animation timelines. We have had
reports of this vulnerability being exploited in the wild. This
vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and
Firefox ESR < 115.16.1.
https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/
https://nvd.nist.gov/vuln/detail/CVE-2024-9680
--
You are receiving this mail because:
You are the assignee for the bug.