CVE-2024-3854
8.8HIGHIn some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115
Publicado: 4/16/2024Atualizado: 4/1/2025
Descrição
In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
Análise IADesenvolvido por IA
Produtos Afetados
mozillafirefox
mozillafirefox
mozillathunderbird
Referências
- https://bugzilla.mozilla.org/show_bug.cgi?id=1884552Issue Tracking
- https://lists.debian.org/debian-lts-announce/2024/04/msg00012.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/04/msg00013.htmlMailing ListThird Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-18/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-19/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-20/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1884552Issue Tracking
- https://lists.debian.org/debian-lts-announce/2024/04/msg00012.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/04/msg00013.htmlMailing ListThird Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-18/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-19/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-20/Vendor Advisory