| Release Date: | 2024-10-01 | |
| Impact: | Moderate | What is this? |
It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
See more information about CVE-2024-9396 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 5.3 |
| Vector String: | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
| Version: | 3.1 |
| Attack Vector: | Local |
| Attack Complexity: | Low |
| Privileges Required: | None |
| User Interaction: | Required |
| Scope: | Unchanged |
| Confidentiality Impact: | Low |
| Integrity Impact: | Low |
| Availability Impact: | Low |
| Platform | Errata | Release Date |
| Oracle Linux version 7 (firefox) | ELSA-2024-7702 | 2024-10-24 |
| Oracle Linux version 8 (firefox) | ELSA-2024-7700 | 2024-10-07 |
| Oracle Linux version 8 (thunderbird) | ELSA-2024-7699 | 2024-10-07 |
| Oracle Linux version 9 (thunderbird) | ELSA-2024-7552 | 2024-10-03 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: