Note:
This project will be discontinued after December 13, 2021. [more]
2019-04-26
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
Products | Firefox, Firefox_esr, Thunderbird |
Type | Use After Free (CWE-416) |
First patch | - None (likely due to unavailable code) |
Links |
• https://www.mozilla.org/security/advisories/mfsa2019-11/
• https://access.redhat.com/errata/RHSA-2019:1144 • https://www.mozilla.org/security/advisories/mfsa2019-08/ • https://bugzilla.mozilla.org/show_bug.cgi?id=1525145 • https://www.mozilla.org/security/advisories/mfsa2019-07/ |