CVE-2024-1546 Affecting firefox package, versions <0:115.8.0-1.0.1.el9_3
Threat Intelligence
EPSS
0.04% (12th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE9-FIREFOX-6274378
- published 25 Feb 2024
- disclosed 20 Feb 2024
Introduced: 20 Feb 2024
CVE-2024-1546 Open this link in a new tabHow to fix?
Upgrade Oracle:9
firefox
to version 0:115.8.0-1.0.1.el9_3 or higher.
This issue was patched in ELSA-2024-0952
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream firefox
package and not the firefox
package as distributed by Oracle
.
See How to fix?
for Oracle:9
relevant fixed versions and status.
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
References
- https://linux.oracle.com/cve/CVE-2024-1546.html
- https://linux.oracle.com/errata/ELSA-2024-0952.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1843752
- https://www.mozilla.org/security/advisories/mfsa2024-05/
- https://www.mozilla.org/security/advisories/mfsa2024-06/
- https://www.mozilla.org/security/advisories/mfsa2024-07/
- https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html
CVSS Scores
version 3.1