We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Reserved 2024-04-30 | Published 2024-05-14 | Updated 2025-03-13 | Assigner mozillaArbitrary JavaScript execution in PDF.js
Thomas Rinsma of Codean Labs
bugzilla.mozilla.org/show_bug.cgi?id=1893645
www.mozilla.org/security/advisories/mfsa2024-21/
www.mozilla.org/security/advisories/mfsa2024-22/
www.mozilla.org/security/advisories/mfsa2024-23/
lists.debian.org/debian-lts-announce/2024/05/msg00010.html
lists.debian.org/debian-lts-announce/2024/05/msg00012.html
Support options