123 Star 0 Fork 55

src-openEuler/firefox

 / 详情

CVE-2024-9680

已挂起
CVE和安全问题 拥有者
创建于  
2024-10-09 21:28

一、漏洞信息
漏洞编号:CVE-2024-9680
漏洞归属组件:firefox
漏洞归属的版本:100.0.2,102.11.0,102.13.0,102.14.0,102.15.0,102.8.0,102.9.0,115.15.0,115.5.0,115.9.0,128.5.0,62.0.3,79.0
CVSS V3.0分值:
BaseScore:9.8 Critical
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.
漏洞公开时间:2024-10-09 21:15:12
漏洞创建时间:2024-10-09 21:28:36
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-9680

更多参考(点击展开)
参考来源 参考链接 来源链接
security.mozilla.org https://bugzilla.mozilla.org/show_bug.cgi?id=1923344
security.mozilla.org https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039
security.mozilla.org https://www.mozilla.org/security/advisories/mfsa2024-51/
security.mozilla.org https://www.mozilla.org/security/advisories/mfsa2024-52/
af854a3a-2127-422b-91ae-364da2661108 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2024/10/msg00005.html
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:7958 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:7977 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8027 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8030 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8026 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8029 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8028 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8024 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8031 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8025 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8032 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8034 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8033 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8131 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8166 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:8176 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHBA-2024:8186 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHBA-2024:8183 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:9552 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:9554 https://bugzilla.redhat.com/show_bug.cgi?id=2317442
debian https://security-tracker.debian.org/tracker/CVE-2024-9680
firefox https://bugzilla.mozilla.org/show_bug.cgi?id=1923344 https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/
gentoo https://security.gentoo.org/glsa/202412-04
anolis https://anas.openanolis.cn/cves/detail/CVE-2024-9680
cve_search https://bugzilla.mozilla.org/show_bug.cgi?id=1923344
cve_search https://www.mozilla.org/security/advisories/mfsa2024-51/
cve_search https://www.mozilla.org/security/advisories/mfsa2024-52/
mageia http://advisories.mageia.org/MGASA-2024-0331.html
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2024-9680 https://explore.alas.aws.amazon.com/CVE-2024-9680.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680 https://explore.alas.aws.amazon.com/CVE-2024-9680.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://bugzilla.mozilla.org/show_bug.cgi?id=1923344 nvd
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039 nvd
https://www.mozilla.org/security/advisories/mfsa2024-51/ nvd
https://www.mozilla.org/security/advisories/mfsa2024-52/ nvd
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992 nvd
https://lists.debian.org/debian-lts-announce/2024/10/msg00005.html nvd

二、漏洞分析结构反馈
影响性分析说明:
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.
openEuler评分:
9.8
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(79.0):受影响
2.openEuler-22.03-LTS-SP3(128.9.0):受影响
3.openEuler-22.03-LTS-SP4(128.9.0):受影响
4.openEuler-24.03-LTS(128.9.0):受影响
5.master(128.9.0):不受影响
6.openEuler-24.03-LTS-Next(128.9.0):不受影响
7.openEuler-24.03-LTS-SP1(128.9.0):不受影响
8.openEuler-24.03-LTS-SP2(128.9.0):

修复是否涉及abi变化(是/否):
1.master(128.9.0):否
2.openEuler-20.03-LTS-SP4(79.0):否
3.openEuler-22.03-LTS-SP3(128.9.0):否
4.openEuler-22.03-LTS-SP4(128.9.0):否
5.openEuler-24.03-LTS(128.9.0):否
6.openEuler-24.03-LTS-Next(128.9.0):否
7.openEuler-24.03-LTS-SP1(128.9.0):否
8.openEuler-24.03-LTS-SP2(128.9.0):

原因说明:
1.openEuler-22.03-LTS-SP3(128.9.0):正常修复
2.openEuler-22.03-LTS-SP4(128.9.0):正常修复
3.openEuler-24.03-LTS(128.9.0):正常修复
4.openEuler-20.03-LTS-SP4(79.0):暂不修复-待升级版本修复
5.master(128.9.0):不受影响-漏洞代码不存在
6.openEuler-24.03-LTS-Next(128.9.0):不受影响-漏洞代码不存在
7.openEuler-24.03-LTS-SP1(128.9.0):不受影响-漏洞代码不存在
8.openEuler-24.03-LTS-SP2(128.9.0):

评论 (12)

openeuler-ci-bot 创建了CVE和安全问题 7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/Application
标签
7个月前
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2024-9680
https://ubuntu.com/security/CVE-2024-9680
https://www.opencve.io/cve/CVE-2024-9680
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-9680
https://security-tracker.debian.org/tracker/CVE-2024-9680

说明:抱歉,当前工具暂未找到推荐补丁,请人工查找或者之后评论'/find-patch'尝试再次查找。
若人工查找到补丁,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 计划开始日期设置为2024-10-10 7个月前
openeuler-ci-bot 计划截止日期设置为2024-10-17 7个月前
openeuler-ci-bot 优先级设置为严重 7个月前
wk333-wk333 wk333 成员 7个月前

影响性分析说明:
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.

openEuler评分:
9.8
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.master:受影响
2.openEuler-20.03-LTS-SP4:受影响
3.openEuler-22.03-LTS-SP1:受影响
4.openEuler-22.03-LTS-SP3:受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:受影响
7.openEuler-22.03-LTS-SP4:受影响

修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP1:否
4.openEuler-22.03-LTS-SP3:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-22.03-LTS-SP4:否

wk333-wk333 wk333 成员 7个月前

影响性分析说明:
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.

openEuler评分:
9.8
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.master:受影响
2.openEuler-20.03-LTS-SP4:受影响
3.openEuler-22.03-LTS-SP1:受影响
4.openEuler-22.03-LTS-SP3:受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:受影响
7.openEuler-22.03-LTS-SP4:受影响

修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP1:否
4.openEuler-22.03-LTS-SP3:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-22.03-LTS-SP4:否

openeuler-ci-bot 修改了描述 7个月前

@ 经过 cve-manager 解析, 已分析的内容如下表所示:

状态 需分析 内容
已分析 1.影响性分析说明 An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.
已分析 2.openEulerScore 9.8
已分析 3.openEulerVector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
已分析 4.受影响版本排查 master:受影响,openEuler-20.03-LTS-SP4:受影响,openEuler-22.03-LTS-SP1:受影响,openEuler-22.03-LTS-SP3:受影响,openEuler-24.03-LTS:受影响,openEuler-24.03-LTS-Next:受影响,openEuler-22.03-LTS-SP4:受影响
已分析 5.修复是否涉及abi变化 master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP1:否,openEuler-22.03-LTS-SP3:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否,openEuler-22.03-LTS-SP4:否

请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.

openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-sync-bot 通过合并 Pull Request !221: [sync] PR-220: Fix CVE-2024-9680任务状态待办的 修改为已完成 7个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 移除了
 
sig/Application
标签
7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 添加了
 
sig/Application
标签
7个月前
openeuler-sync-bot 通过合并 Pull Request !222: [sync] PR-220: Fix CVE-2024-9680任务状态待办的 修改为已完成 7个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 7个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 移除了
 
sig/Application
标签
7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 添加了
 
sig/Application
标签
7个月前
wk333-wk333 wk333 成员 2个月前

受影响版本排查(受影响/不受影响):
1.master:不受影响
2.openEuler-20.03-LTS-SP4:受影响
3.openEuler-22.03-LTS-SP3:受影响
4.openEuler-22.03-LTS-SP4:受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-24.03-LTS-SP1:不受影响

修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP3:否
4.openEuler-22.03-LTS-SP4:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-24.03-LTS-SP1:否

原因说明:
1.master:不受影响-漏洞代码不存在
2.openEuler-20.03-LTS-SP4:暂不修复-待升级版本修复
3.openEuler-22.03-LTS-SP3:正常修复
6.openEuler-22.03-LTS-SP4:正常修复
5.openEuler-24.03-LTS:正常修复
6.openEuler-24.03-LTS-Next:不受影响-漏洞代码不存在
7.openEuler-24.03-LTS-SP1:不受影响-漏洞代码不存在

openeuler-ci-bot 修改了描述 2个月前

@ 经过 cve-manager 解析, 已分析的内容如下表所示:

状态 分析项目 内容
已分析 1.影响性分析说明 An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.
已分析 2.openEulerScore 9.8
已分析 3.openEulerVector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
已分析 4.受影响版本排查 openEuler-20.03-LTS-SP4:受影响,openEuler-22.03-LTS-SP3:受影响,openEuler-22.03-LTS-SP4:受影响,openEuler-24.03-LTS:受影响,master:不受影响,openEuler-24.03-LTS-Next:不受影响,openEuler-24.03-LTS-SP1:不受影响
已分析 5.是否涉及abi变化 master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP3:否,openEuler-22.03-LTS-SP4:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否,openEuler-24.03-LTS-SP1:否
已分析 6.原因说明 openEuler-22.03-LTS-SP3:正常修复,openEuler-22.03-LTS-SP4:正常修复,openEuler-24.03-LTS:正常修复,openEuler-20.03-LTS-SP4:暂不修复-待升级版本修复,master:不受影响-漏洞代码不存在,openEuler-24.03-LTS-Next:不受影响-漏洞代码不存在,openEuler-24.03-LTS-SP1:不受影响-漏洞代码不存在

请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.

openeuler-ci-bot 任务状态待办的 修改为进行中 2个月前
wk333-wk333 wk333 成员 2个月前

openEuler评分:
BaseScore: 9.8 Critical
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

@ 经过 cve-manager 解析, 已分析的内容如下表所示:

状态 分析项目 内容
已分析 1.影响性分析说明 An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.
已分析 2.openEulerScore 9.8
已分析 3.openEulerVector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
已分析 4.受影响版本排查 openEuler-20.03-LTS-SP4:受影响,openEuler-22.03-LTS-SP3:受影响,openEuler-22.03-LTS-SP4:受影响,openEuler-24.03-LTS:受影响,master:不受影响,openEuler-24.03-LTS-Next:不受影响,openEuler-24.03-LTS-SP1:不受影响
已分析 5.是否涉及abi变化 master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP3:否,openEuler-22.03-LTS-SP4:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否,openEuler-24.03-LTS-SP1:否
已分析 6.原因说明 openEuler-22.03-LTS-SP3:正常修复,openEuler-22.03-LTS-SP4:正常修复,openEuler-24.03-LTS:正常修复,openEuler-20.03-LTS-SP4:暂不修复-待升级版本修复,master:不受影响-漏洞代码不存在,openEuler-24.03-LTS-Next:不受影响-漏洞代码不存在,openEuler-24.03-LTS-SP1:不受影响-漏洞代码不存在

请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.

openeuler-ci-bot 修改了描述 2个月前
openeuler-ci-bot 任务状态进行中 修改为已挂起 2个月前
openeuler-ci-bot 修改了描述 2个月前
openeuler-ci-bot 修改了描述 18天前

登录 后才可以发表评论

状态
负责人
项目
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
里程碑
分支
参与者(2)
5329419 openeuler ci bot 1632792936 wk333-wk333
1
https://gitee.com/src-openeuler/firefox.git
git@gitee.com:src-openeuler/firefox.git
src-openeuler
firefox
firefox

搜索帮助