A suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *Note: This issue only affected Linux operating systems. Other operating systems are unaffected.* This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-33/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-35/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-34/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-36/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1696138 | issue tracking exploit vendor advisory |
https://security.gentoo.org/glsa/202202-03 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202208-14 | third party advisory vendor advisory |