Описание
By using a link with rel="localization"
a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 99.0+build2-0ubuntu0.18.04.2 |
devel | released | 1:1snap1-0ubuntu1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | released | 99.0+build2-0ubuntu0.20.04.2 |
impish | released | 99.0+build2-0ubuntu0.21.10.2 |
jammy | released | 1:1snap1-0ubuntu1 |
kinetic | released | 1:1snap1-0ubuntu1 |
lunar | released | 1:1snap1-0ubuntu1 |
trusty | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1:91.8.1+build1-0ubuntu0.18.04.1 |
devel | not-affected | 1:91.8.0+build2-0ubuntu1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | released | 1:91.8.1+build1-0ubuntu0.20.04.1 |
impish | released | 1:91.8.1+build1-0ubuntu0.21.10.1 |
jammy | not-affected | 1:91.8.0+build2-0ubuntu1 |
kinetic | not-affected | 1:91.8.0+build2-0ubuntu1 |
lunar | not-affected | 1:91.8.0+build2-0ubuntu1 |
trusty | ignored | end of standard support |
Показывать по
Ссылки на источники
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
By using a link with <code>rel="localization"</code> a use-after-free ...
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой освобождения памяти при обработке ссылок rel="localization", позволяющая нарушителю выполнить произвольный код
EPSS
6.5 Medium
CVSS3