First published: Tue Oct 08 2024(Updated: )
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <131.0.2 | 131.0.2 |
Mozilla Firefox ESR | <115.16.1 | 115.16.1 |
Mozilla Firefox ESR | <128.3.1 | 128.3.1 |
Mozilla Thunderbird | <115.16 | 115.16 |
Mozilla Thunderbird | <128.3.1 | 128.3.1 |
Mozilla Thunderbird | <131.0.1 | 131.0.1 |
Mozilla Firefox | ||
Mozilla Firefox | <131.0.2 | |
Mozilla Firefox ESR | <115.16.1 | |
Mozilla Firefox ESR | >=128.0<128.3.1 | |
Mozilla Thunderbird | <115.16.0 | |
Mozilla Thunderbird | >=128.0.1<128.3.1 | |
Mozilla Thunderbird | =131.0 | |
debian/firefox | 131.0.3-1 | |
debian/firefox-esr | <=115.14.0esr-1~deb11u1<=115.14.0esr-1~deb12u1 | 128.3.1esr-1~deb11u1 128.3.1esr-1~deb12u1 128.3.1esr-2 |
debian/thunderbird | <=1:115.12.0-1~deb11u1<=1:115.12.0-1~deb12u1<=1:128.2.0esr-1<=1:128.3.0esr-1 | 1:115.16.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.