Описание
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
The Mozilla Foundation Security Advisory describes this flaw as:
When interacting with an HTML input element's file picker dialog with webkitdirectory
set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2021:4116 | 03.11.2021 |
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2021:4134 | 04.11.2021 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2021:4123 | 03.11.2021 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2021:4130 | 04.11.2021 |
Red Hat Enterprise Linux 8.1 Extended Update Support | thunderbird | Fixed | RHSA-2021:4133 | 04.11.2021 |
Red Hat Enterprise Linux 8.1 Extended Update Support | firefox | Fixed | RHSA-2021:4607 | 10.11.2021 |
Red Hat Enterprise Linux 8.2 Extended Update Support | thunderbird | Fixed | RHSA-2021:4132 | 04.11.2021 |
Red Hat Enterprise Linux 8.2 Extended Update Support | firefox | Fixed | RHSA-2021:4605 | 10.11.2021 |
Показывать по
Дополнительная информация
Статус:
8.8 High
CVSS3
Связанные уязвимости
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
When interacting with an HTML input element's file picker dialog with ...
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
Уязвимость веб-браузера Firefox и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
8.8 High
CVSS3