https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
Henrich Hartzer changed:
What|Removed |Added
CC||henrichhart...@tuta.io
--- Comme
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
Tomasz "CeDeROM" CEDRO changed:
What|Removed |Added
Resolution|--- |FIXED
Status|
An attacker was able to achieve code execution in the content process
by exploiting a use-after-free in Animation timelines. We have had
reports of this vulnerability being exploited in the wild. This
vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and
Firefox ESR < 115.16.1.
https
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
--
CeDeROM, SQ7MHZ, http://www.tomek.cedro.info
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
Bug ID: 281992
Summary: www/firefox: 0day 9.8 score CVE-2024-9680 upgrade
ASAP.
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
Tomasz "CeDeROM" CEDRO changed:
What|Removed |Added
CC||ge...@freebsd.org,
Bugzilla Automation has asked freebsd-gecko (Nobody)
for maintainer-feedback:
Bug 281992: www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
--- Description ---
An attacker was able to achieve code execution in the content process
b
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
Vladimir Druzenko changed:
What|Removed |Added
CC||v...@freebsd.org
--- Comment #