CVE Vulnerabilities

CVE-2024-6607

Release of Invalid Pointer or Reference

Published: Jul 09, 2024 | Modified: Jul 16, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

It was possible to prevent a user from exiting pointerlock when pressing escape and to overlay customValidity notifications from a &lt;select&gt; element over certain permission prompts. This could be used to confuse a user into giving a site unintended permissions. This vulnerability affects Firefox < 128 and Thunderbird < 128.

Weakness

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*128.0 (excluding)
ThunderbirdMozilla*128.0 (excluding)
FirefoxUbuntufocal*
Mozjs102Ubuntudevel*
Mozjs102Ubuntuesm-apps/noble*
Mozjs102Ubuntujammy*
Mozjs102Ubuntumantic*
Mozjs102Ubuntunoble*
Mozjs102Ubuntuupstream*
Mozjs38Ubuntuesm-apps/bionic*
Mozjs38Ubuntuupstream*
Mozjs52Ubuntuesm-apps/focal*
Mozjs52Ubuntuesm-infra/bionic*
Mozjs52Ubuntufocal*
Mozjs52Ubuntuupstream*
Mozjs68Ubuntuesm-infra/focal*
Mozjs68Ubuntufocal*
Mozjs68Ubuntuupstream*
Mozjs78Ubuntuesm-apps/jammy*
Mozjs78Ubuntujammy*
Mozjs78Ubuntuupstream*
Mozjs91Ubuntujammy*
Mozjs91Ubuntuupstream*
ThunderbirdUbuntumantic*

Extended Description

This weakness can take several forms, such as:

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, glibc in Linux provides protection against free of invalid pointers.

References