Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1842658 | issue tracking permissions required |
https://www.mozilla.org/security/advisories/mfsa2023-29/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-30/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-31/ | vendor advisory |
https://www.debian.org/security/2023/dsa-5464 | third party advisory |
https://www.debian.org/security/2023/dsa-5469 | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html | |
https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html |