First published: Tue Dec 07 2021(Updated: )
By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <91.4 | 91.4 |
<95 | 95 | |
<91.4 | 91.4 | |
<91.4 | 91.4 | |
Mozilla Firefox | <95.0 | |
Mozilla Firefox ESR | <91.4.0 | |
Mozilla Thunderbird | <91.4.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 115.4.0esr-1 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-43538.
This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
By misusing a race in the notification code, an attacker can forcefully hide the notification for pages that have received full screen and pointer lock access.
This vulnerability could be used for spoofing attacks.
You can find more information about this vulnerability at the following links: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1739091), [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/), [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2021-52/).