{"id":"USN-6747-1","summary":"firefox vulnerabilities","details":"Multiple security issues were discovered in Firefox. If a user were\ntricked into opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, obtain sensitive\ninformation across domains, or execute arbitrary code. (CVE-2024-3852,\nCVE-2024-3864, CVE-2024-3865)\n\nBartek Nowotarski discovered that Firefox did not properly limit HTTP/2\nCONTINUATION frames. An attacker could potentially exploit this issue to\ncause a denial of service. (CVE-2024-3302)\n\nGary Kwong discovered that Firefox did not properly manage memory when\nrunning garbage collection during realm initialization. An attacker could\npotentially exploit this issue to cause a denial of service, or execute\narbitrary code. (CVE-2024-3853)\n\nLukas Bernhard discovered that Firefox did not properly manage memory\nduring JIT optimisations, leading to an out-of-bounds read vulnerability.\nAn attacker could possibly use this issue to cause a denial of service or\nexpose sensitive information. (CVE-2024-3854, CVE-2024-3855)\n\nNan Wang discovered that Firefox did not properly manage memory during\nWASM garbage collection. An attacker could potentially exploit this issue\nto cause a denial of service, or execute arbitrary code. (CVE-2024-3856)\n\nLukas Bernhard discovered that Firefox did not properly manage memory\nwhen handling JIT created code during garbage collection. An attacker\ncould potentially exploit this issue to cause a denial of service, or\nexecute arbitrary code. (CVE-2024-3857)\n\nLukas Bernhard discovered that Firefox did not properly manage memory when\ntracing in JIT. An attacker could potentially exploit this issue to cause\na denial of service. (CVE-2024-3858)\n\nRonald Crane discovered that Firefox did not properly manage memory in the\nOpenType sanitizer on 32-bit devices, leading to an out-of-bounds read \nvulnerability. An attacker could possibly use this issue to cause a denial\nof service or expose sensitive information. (CVE-2024-3859)\n\nGarry Kwong discovered that Firefox did not properly manage memory when\ntracing empty shape lists in JIT. An attacker could potentially exploit \nthis issue to cause a denial of service. (CVE-2024-3860)\n\nRonald Crane discovered that Firefox did not properly manage memory when\nhandling an AlignedBuffer. An attacker could potentially exploit this \nissue to cause denial of service, or execute arbitrary code. \n(CVE-2024-3861)\n\nRonald Crane discovered that Firefox did not properly manage memory when\nhandling code in MarkStack. An attacker could possibly use this issue to\ncause a denial of service or execute arbitrary code. (CVE-2024-3862)\n","modified":"2026-04-22T11:17:19.806675Z","published":"2024-04-24T04:43:24Z","related":["UBUNTU-CVE-2024-3302","UBUNTU-CVE-2024-3852","UBUNTU-CVE-2024-3853","UBUNTU-CVE-2024-3854","UBUNTU-CVE-2024-3855","UBUNTU-CVE-2024-3856","UBUNTU-CVE-2024-3857","UBUNTU-CVE-2024-3858","UBUNTU-CVE-2024-3859","UBUNTU-CVE-2024-3860","UBUNTU-CVE-2024-3861","UBUNTU-CVE-2024-3862","UBUNTU-CVE-2024-3864","UBUNTU-CVE-2024-3865"],"upstream":["CVE-2024-3302","CVE-2024-3852","CVE-2024-3853","CVE-2024-3854","CVE-2024-3855","CVE-2024-3856","CVE-2024-3857","CVE-2024-3858","CVE-2024-3859","CVE-2024-3860","CVE-2024-3861","CVE-2024-3862","CVE-2024-3864","CVE-2024-3865","UBUNTU-CVE-2024-3302","UBUNTU-CVE-2024-3852","UBUNTU-CVE-2024-3853","UBUNTU-CVE-2024-3854","UBUNTU-CVE-2024-3855","UBUNTU-CVE-2024-3856","UBUNTU-CVE-2024-3857","UBUNTU-CVE-2024-3858","UBUNTU-CVE-2024-3859","UBUNTU-CVE-2024-3860","UBUNTU-CVE-2024-3861","UBUNTU-CVE-2024-3862","UBUNTU-CVE-2024-3864","UBUNTU-CVE-2024-3865"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6747-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3302"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3852"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3853"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3854"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3855"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3856"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3857"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3858"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3859"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3860"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3862"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-3865"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/firefox@125.0.2+build1-0ubuntu0.20.04.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"125.0.2+build1-0ubuntu0.20.04.2"}]}],"versions":["69.0.3+build1-0ubuntu1","70.0+build2-0ubuntu1","70.0+build2-0ubuntu2","70.0.1+build1-0ubuntu2","71.0+build2-0ubuntu2","71.0+build5-0ubuntu1","72.0.1+build1-0ubuntu1","72.0.2+build1-0ubuntu1","73.0+build1-0ubuntu1","73.0+build2-0ubuntu1","73.0+build3-0ubuntu1","73.0.1+build1-0ubuntu1","74.0+build1-0ubuntu1","74.0+build2-0ubuntu1","74.0+build2-0ubuntu2","74.0+build3-0ubuntu1","75.0+build3-0ubuntu1","76.0+build2-0ubuntu0.20.04.1","76.0.1+build1-0ubuntu0.20.04.1","77.0.1+build1-0ubuntu0.20.04.1","78.0.1+build1-0ubuntu0.20.04.1","78.0.2+build2-0ubuntu0.20.04.1","79.0+build1-0ubuntu0.20.04.1","80.0+build2-0ubuntu0.20.04.1","80.0.1+build1-0ubuntu0.20.04.1","81.0+build2-0ubuntu0.20.04.1","81.0.2+build1-0ubuntu0.20.04.1","82.0+build2-0ubuntu0.20.04.1","82.0.2+build1-0ubuntu0.20.04.1","82.0.3+build1-0ubuntu0.20.04.1","83.0+build2-0ubuntu0.20.04.1","84.0+build3-0ubuntu0.20.04.1","84.0.1+build1-0ubuntu0.20.04.1","84.0.2+build1-0ubuntu0.20.04.1","85.0+build1-0ubuntu0.20.04.1","85.0.1+build1-0ubuntu0.20.04.1","86.0+build3-0ubuntu0.20.04.1","86.0.1+build1-0ubuntu0.20.04.1","87.0+build3-0ubuntu0.20.04.2","88.0+build2-0ubuntu0.20.04.1","88.0.1+build1-0ubuntu0.20.04.2","89.0+build2-0ubuntu0.20.04.2","89.0.1+build1-0ubuntu0.20.04.1","89.0.2+build1-0ubuntu0.20.04.1","90.0+build1-0ubuntu0.20.04.1","90.0.2+build1-0ubuntu0.20.04.1","91.0+build2-0ubuntu0.20.04.1","91.0.1+build1-0ubuntu0.20.04.1","91.0.2+build1-0ubuntu0.20.04.1","92.0+build3-0ubuntu0.20.04.1","93.0+build1-0ubuntu0.20.04.1","94.0+build3-0ubuntu0.20.04.1","95.0+build1-0ubuntu0.20.04.1","95.0.1+build2-0ubuntu0.20.04.1","96.0+build2-0ubuntu0.20.04.1","97.0+build2-0ubuntu0.20.04.1","97.0.2+build1-0ubuntu0.20.04.1","98.0+build3-0ubuntu0.20.04.2","98.0.1+build2-0ubuntu0.20.04.1","98.0.2+build1-0ubuntu0.20.04.1","99.0+build2-0ubuntu0.20.04.2","100.0+build2-0ubuntu0.20.04.1","100.0.2+build1-0ubuntu0.20.04.1","101.0.1+build1-0ubuntu0.20.04.1","102.0+build2-0ubuntu0.20.04.1","103.0+build1-0ubuntu0.20.04.1","104.0+build3-0ubuntu0.20.04.1","105.0+build2-0ubuntu0.20.04.1","106.0.2+build1-0ubuntu0.20.04.1","106.0.5+build1-0ubuntu0.20.04.1","107.0+build2-0ubuntu0.20.04.1","108.0+build2-0ubuntu0.20.04.1","108.0.1+build1-0ubuntu0.20.04.1","108.0.2+build1-0ubuntu0.20.04.1","109.0+build2-0ubuntu0.20.04.1","109.0.1+build1-0ubuntu0.20.04.2","110.0+build3-0ubuntu0.20.04.1","110.0.1+build2-0ubuntu0.20.04.1","111.0+build2-0ubuntu0.20.04.1","111.0.1+build2-0ubuntu0.20.04.1","112.0+build2-0ubuntu0.20.04.1","112.0.1+build1-0ubuntu0.20.04.1","112.0.2+build1-0ubuntu0.20.04.1","113.0+build2-0ubuntu0.20.04.1","113.0.1+build1-0ubuntu0.20.04.1","113.0.2+build1-0ubuntu0.20.04.1","114.0+build3-0ubuntu0.20.04.1","114.0.1+build1-0ubuntu0.20.04.1","114.0.2+build1-0ubuntu0.20.04.1","115.0+build2-0ubuntu0.20.04.3","115.0.2+build1-0ubuntu0.20.04.1","116.0+build2-0ubuntu0.20.04.2","116.0.2+build1-0ubuntu0.20.04.1","116.0.3+build2-0ubuntu0.20.04.1","117.0+build2-0ubuntu0.20.04.1","117.0.1+build2-0ubuntu0.20.04.1","118.0.1+build1-0ubuntu0.20.04.1","118.0.2+build2-0ubuntu0.20.04.1","119.0+build2-0ubuntu0.20.04.1","119.0.1+build1-0ubuntu0.20.04.1","120.0+build2-0ubuntu0.20.04.1","120.0.1+build1-0ubuntu0.20.04.1","121.0+build1-0ubuntu0.20.04.1","121.0.1+build1-0ubuntu0.20.04.1","122.0+build2-0ubuntu0.20.04.1","122.0.1+build1-0ubuntu0.20.04.1","123.0+build3-0ubuntu0.20.04.1","123.0.1+build1-0ubuntu0.20.04.1","124.0+build1-0ubuntu0.20.04.1","124.0.1+build1-0ubuntu0.20.04.1","124.0.2+build1-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"125.0.2+build1-0ubuntu0.20.04.2","binary_name":"firefox"},{"binary_version":"125.0.2+build1-0ubuntu0.20.04.2","binary_name":"firefox-geckodriver"},{"binary_version":"125.0.2+build1-0ubuntu0.20.04.2","binary_name":"firefox-mozsymbols"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6747-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3302"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3852"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3853"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3854"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3855"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3856"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3857"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3858"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3859"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3860"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3861"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3862"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3864"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-3865"}]}}}],"schema_version":"1.7.5"}