Описание
When calling JS::CheckRegExpSyntax
a Syntax Error could have been set which would end in calling convertToRuntimeErrorAndClear
. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
The Mozilla Foundation Security Advisory describes this flaw as:
When calling JS::CheckRegExpSyntax
a Syntax Error could have been set which would end in calling convertToRuntimeErrorAndClear
. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2023:4945 | 04.09.2023 |
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2023:5019 | 07.09.2023 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2023:4952 | 04.09.2023 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2023:4954 | 04.09.2023 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | thunderbird | Fixed | RHSA-2023:4948 | 04.09.2023 |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | firefox | Fixed | RHSA-2023:4949 | 04.09.2023 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | thunderbird | Fixed | RHSA-2023:4946 | 04.09.2023 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | firefox | Fixed | RHSA-2023:4951 | 04.09.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
When calling `JS::CheckRegExpSyntax` a Syntax Error could have been se ...
When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6.1 Medium
CVSS3