Hi,

I checked Koji and there seems no build in process to fix this 0-Day exploitation in firefix

https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/

The "News" about it is already out and exploited:

Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild.

The vulnerability, tracked as*CVE-2024-9680*, has been described as a use-after-free bug in the Animation timeline component.

"An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines," Mozilla said <https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/> in a Wednesday advisory.

*"We have had reports of this vulnerability being exploited in the wild."*

*
*

Can one assist Martin and start the build process?

I send Martin a message, in hope he read it earlier than the list / br ones.


From My POV: NoScript will negate the attack on untrusted websites. But ADs on trusted websites will be the most used way to exploit this.


best regards,
Marius Schwarz*
*
-- 
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to