CVE-2024-5696

NameCVE-2024-5696
DescriptionBy manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3825-1, DSA-5709-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid127.0-1fixed
firefox-esr (PTS)buster91.12.0esr-1~deb10u1vulnerable
buster (security)115.12.0esr-1~deb10u1fixed
bullseye115.7.0esr-1~deb11u1vulnerable
bullseye (security)115.12.0esr-1~deb11u1fixed
bookworm115.7.0esr-1~deb12u1vulnerable
bookworm (security)115.12.0esr-1~deb12u1fixed
trixie115.11.0esr-1vulnerable
sid115.12.0esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)127.0-1
firefox-esrsourcebuster115.12.0esr-1~deb10u1DLA-3825-1
firefox-esrsourcebullseye115.12.0esr-1~deb11u1DSA-5709-1
firefox-esrsourcebookworm115.12.0esr-1~deb12u1DSA-5709-1
firefox-esrsource(unstable)115.12.0esr-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2024-25/#CVE-2024-5696
https://www.mozilla.org/en-US/security/advisories/mfsa2024-26/#CVE-2024-5696

Search for package or bug name: Reporting problems