When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1839007 | issue tracking permissions required |
https://www.mozilla.org/security/advisories/mfsa2023-34/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-36/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-38/ | vendor advisory |