CVE-2024-3854
8.8HIGHIn some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115
Published: 4/16/2024Updated: 4/1/2025
Description
In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
AI AnalysisPowered by AI
Affected Products
mozillafirefox
mozillafirefox
mozillathunderbird
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1884552Issue Tracking
- https://lists.debian.org/debian-lts-announce/2024/04/msg00012.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/04/msg00013.htmlMailing ListThird Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-18/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-19/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-20/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1884552Issue Tracking
- https://lists.debian.org/debian-lts-announce/2024/04/msg00012.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/04/msg00013.htmlMailing ListThird Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-18/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-19/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-20/Vendor Advisory