Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-28282

Опубликовано: 22 дек. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.5

Описание

By using a link with rel="localization" a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

РелизСтатусПримечание
bionic

released

99.0+build2-0ubuntu0.18.04.2
devel

released

1:1snap1-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

99.0+build2-0ubuntu0.20.04.2
impish

released

99.0+build2-0ubuntu0.21.10.2
jammy

released

1:1snap1-0ubuntu1
kinetic

released

1:1snap1-0ubuntu1
lunar

released

1:1snap1-0ubuntu1
trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

released

1:91.8.1+build1-0ubuntu0.18.04.1
devel

not-affected

1:91.8.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

1:91.8.1+build1-0ubuntu0.20.04.1
impish

released

1:91.8.1+build1-0ubuntu0.21.10.1
jammy

not-affected

1:91.8.0+build2-0ubuntu1
kinetic

not-affected

1:91.8.0+build2-0ubuntu1
lunar

not-affected

1:91.8.0+build2-0ubuntu1
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 90%
0.06124
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
около 3 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.5
nvd
больше 2 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.5
debian
больше 2 лет назад

By using a link with <code>rel="localization"</code> a use-after-free ...

CVSS3: 6.5
github
больше 2 лет назад

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

CVSS3: 6.1
fstec
около 3 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой освобождения памяти при обработке ссылок rel=&quot;localization&quot;, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 90%
0.06124
Низкий

6.5 Medium

CVSS3