Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-25752

Опубликовано: 02 июн. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.5

Описание

When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.

РелизСтатусПримечание
bionic

released

111.0+build2-0ubuntu0.18.04.1
devel

not-affected

code not present
esm-infra/focal

DNE

focal

released

111.0+build2-0ubuntu0.20.04.1
jammy

not-affected

code not present
kinetic

not-affected

code not present
lunar

not-affected

code not present
mantic

not-affected

code not present
noble

not-affected

code not present
trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/bionic

ignored

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/focal

ignored

esm-infra/bionic

ignored

focal

ignored

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

ignored

focal

ignored

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/jammy

ignored

esm-infra/focal

DNE

focal

DNE

jammy

ignored

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

DNE

noble

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

DNE

focal

DNE

jammy

ignored

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

released

1:102.9.0+build1-0ubuntu0.18.04.1
devel

not-affected

1:102.10.0+build2-0ubuntu1
esm-infra/focal

DNE

focal

released

1:102.9.0+build1-0ubuntu0.20.04.1
jammy

released

1:102.9.0+build1-0ubuntu0.22.04.1
kinetic

released

1:102.9.0+build1-0ubuntu0.22.10.1
lunar

not-affected

1:102.10.0+build2-0ubuntu1
mantic

not-affected

1:102.10.0+build2-0ubuntu1
noble

not-affected

1:102.10.0+build2-0ubuntu1
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 28%
0.00098
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 2 лет назад

When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.

CVSS3: 6.5
nvd
около 2 лет назад

When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.

CVSS3: 6.5
debian
около 2 лет назад

When accessing throttled streams, the count of available bytes needed ...

CVSS3: 6.5
github
около 2 лет назад

When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.

CVSS3: 6.1
fstec
больше 2 лет назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 28%
0.00098
Низкий

6.5 Medium

CVSS3

Уязвимость CVE-2023-25752