Описание
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| firefox-esr | fixed | 60.6.0esr-1 | package | |
| firefox | fixed | 66.0-1 | package | |
| thunderbird | fixed | 1:60.6.1-1 | package |
Примечания
https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/#CVE-2019-9790
https://www.mozilla.org/en-US/security/advisories/mfsa2019-07/#CVE-2019-9790
https://www.mozilla.org/en-US/security/advisories/mfsa2019-11/#CVE-2019-9790
EPSS
Связанные уязвимости
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
Уязвимость браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
EPSS