Описание
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
The Mozilla Foundation Security Advisory describes this flaw as:
Applying a CSS filter effect could have accessed out-of-bounds memory. This could have led to a heap-buffer-overflow, causing a potentially exploitable crash.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2022:0124 | 12.01.2022 |
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2022:0127 | 12.01.2022 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2022:0129 | 12.01.2022 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2022:0130 | 12.01.2022 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | firefox | Fixed | RHSA-2022:0125 | 12.01.2022 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | thunderbird | Fixed | RHSA-2022:0131 | 12.01.2022 |
Red Hat Enterprise Linux 8.2 Extended Update Support | thunderbird | Fixed | RHSA-2022:0123 | 12.01.2022 |
Red Hat Enterprise Linux 8.2 Extended Update Support | firefox | Fixed | RHSA-2022:0132 | 12.01.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Applying a CSS filter effect could have accessed out of bounds memory. ...
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Уязвимость функции blendGaussianBlur почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать переполнение буфера кучи и выполнить произвольный код в целевой системе
EPSS
8.8 High
CVSS3