Context-specific code was included in a shared jump table; resulting in assertions being triggered in multithreaded wasm code. This vulnerability affects Firefox < 86.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-07/ | release notes vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1681724 | issue tracking permissions required vendor advisory |
https://security.gentoo.org/glsa/202104-10 | third party advisory vendor advisory |