Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-03/ | release notes vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-04/ | release notes vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-05/ | release notes vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1684020 | issue tracking permissions required vendor advisory |