Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-6603

Опубликовано: 09 июл. 2024
Источник: debian
EPSS Низкий

Описание

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed128.0-1package
firefox-esrfixed115.13.0esr-1package
thunderbirdfixed1:115.13.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-29/#CVE-2024-6603

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-30/#CVE-2024-6603

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-31/#CVE-2024-6603

EPSS

Процентиль: 58%
0.00374
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 1 года назад

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.

CVSS3: 6.1
redhat
больше 1 года назад

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.

CVSS3: 7.4
nvd
больше 1 года назад

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.

msrc
2 месяца назад

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.

CVSS3: 7.4
github
больше 1 года назад

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128 and Firefox ESR < 115.13.

EPSS

Процентиль: 58%
0.00374
Низкий