When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-28/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-31/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-30/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-29/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-32/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1771774 | issue tracking vendor advisory |