Описание
In the nsTArray_Impl::ReplaceElementsAt()
function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
The Mozilla Foundation Security Advisory describes this flaw as:
In the nsTArray_Impl::ReplaceElementsAt()
function, where an integer overflow could occur when the number of elements to replace was too large for the container.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2022:5479 | 01.07.2022 |
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2022:5480 | 01.07.2022 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2022:5469 | 30.06.2022 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2022:5470 | 30.06.2022 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | firefox | Fixed | RHSA-2022:5477 | 30.06.2022 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | thunderbird | Fixed | RHSA-2022:5478 | 30.06.2022 |
Red Hat Enterprise Linux 8.2 Extended Update Support | firefox | Fixed | RHSA-2022:5474 | 01.07.2022 |
Red Hat Enterprise Linux 8.2 Extended Update Support | thunderbird | Fixed | RHSA-2022:5475 | 01.07.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an in ...
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Уязвимость функции nsTArray_Impl::ReplaceElementsAt() почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
EPSS
8.8 High
CVSS3