CVE-2024-9400

NameCVE-2024-9400
DescriptionA potential memory corruption vulnerability could be triggered if an attacker had the ability to trigger an OOM at a specific moment during JIT compilation. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid132.0.1-1fixed
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1fixed
bullseye (security)1:128.4.0esr-1~deb11u1fixed
bookworm1:115.16.0esr-1~deb12u1fixed
bookworm (security)1:128.4.0esr-1~deb12u1fixed
sid, trixie1:128.4.2esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)131.0-1
thunderbirdsourcebullseye(not affected)
thunderbirdsourcebookworm(not affected)
thunderbirdsource(unstable)1:128.3.0esr-1

Notes

[bookworm] - thunderbird <not-affected> (Vulnerable code not present)
[bullseye] - thunderbird <not-affected> (Vulnerable code not present)
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9400
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9400

Search for package or bug name: Reporting problems