ALAS2FIREFOX-2024-024 --- firefoxID: oval:org.secpod.oval:def:1702245 | Date: (C)2024-05-09 (M)2024-06-03 |
Class: PATCH | Family: unix |
An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. This vulnerability affects Firefox less than 124.0.1 and Firefox ESR less than 115.9.1. There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox less than 125 and Firefox ESR less than 115.10. GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox less than 125 and Firefox ESR less than 115.10. In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox less than 125 and Firefox ESR less than 115.10. The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox less than 125 and Firefox ESR less than 115.10. If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox less than 125 and Firefox ESR less than 115.10. Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox less than 125 and Firefox ESR less than 115.10