ALAS2-2023-1945 --- thunderbirdDeprecated |
ID: oval:org.secpod.oval:def:1701164 | Date: (C)2023-02-24 (M)2023-12-20 |
Class: PATCH | Family: unix |
The Mozilla Foundation Security Advisory describes this flaw as:Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. The Mozilla Foundation Security Advisory describes this flaw as:Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. The Mozilla Foundation Security Advisory describes this flaw as:When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. The Mozilla Foundation Security Advisory describes this flaw as:When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. The Mozilla Foundation Security Advisory describes this flaw as:When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected This could have caused add-ons to become out-of-date silently without notification to the user