By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-53/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-54/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-52/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1739091 | issue tracking permissions required vendor advisory |
https://www.debian.org/security/2021/dsa-5026 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5034 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202202-03 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202208-14 | third party advisory vendor advisory |