When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1796023 | issue tracking permissions required |
https://www.mozilla.org/security/advisories/mfsa2023-54/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-55/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-56/ | vendor advisory |
https://www.debian.org/security/2023/dsa-5581 | third party advisory |
https://www.debian.org/security/2023/dsa-5582 | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202401-10 | third party advisory |