Описание
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that when accessing throttled streams, the count of available bytes needs to be checked in the calling function to be within bounds. This may have led future code to be incorrect and vulnerable.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2023:1333 | 20.03.2023 |
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2023:1401 | 22.03.2023 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2023:1336 | 20.03.2023 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2023:1403 | 22.03.2023 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | thunderbird | Fixed | RHSA-2023:1442 | 23.03.2023 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | firefox | Fixed | RHSA-2023:1479 | 27.03.2023 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | thunderbird | Fixed | RHSA-2023:1443 | 23.03.2023 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | firefox | Fixed | RHSA-2023:1445 | 23.03.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
When accessing throttled streams, the count of available bytes needed ...
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
6.1 Medium
CVSS3