Out-of-bounds Write Affecting firefox package, versions <129.0.2-r0
Threat Intelligence
EPSS
0.08% (36th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-FIREFOX-7840352
- published 27 Aug 2024
- disclosed 6 Aug 2024
Introduced: 6 Aug 2024
CVE-2024-7519 Open this link in a new tabHow to fix?
Upgrade Wolfi
firefox
to version 129.0.2-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream firefox
package and not the firefox
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
- https://www.mozilla.org/security/advisories/mfsa2024-33/
- https://www.mozilla.org/security/advisories/mfsa2024-34/
- https://www.mozilla.org/security/advisories/mfsa2024-35/
- https://www.mozilla.org/security/advisories/mfsa2024-37/
- https://www.mozilla.org/security/advisories/mfsa2024-38/
CVSS Scores
version 3.1