Lucene search

K
mageiaGentoo FoundationMGASA-2024-0153
HistoryApr 27, 2024 - 9:26 a.m.

Updated firefox packages fix security vulnerabilities

2024-04-2709:26:16
Gentoo Foundation
advisories.mageia.org
15
firefox
security
vulnerabilities
update
unix
http/2
memory safety

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.1%

CVE-2024-3852: GetBoundName in the JIT returned the wrong object CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection CVE-2024-2609: Permission prompt input delay could expire when not in focus CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10

OSVersionArchitecturePackageVersionFilename
Mageia9noarchfirefox< 115.10.0-1firefox-115.10.0-1.mga9
Mageia9noarchfirefox-l10n< 115.10.0-1firefox-l10n-115.10.0-1.mga9