First published: Tue Apr 05 2022(Updated: )
After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <91.8 | 91.8 |
<91.8 | 91.8 | |
<91.8 | 91.8 | |
Mozilla Firefox ESR | <91.8 | |
Mozilla Thunderbird | <91.8 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2022-1196.
CVE-2022-1196 has a severity level of medium.
CVE-2022-1196 affects Mozilla Firefox ESR version up to 91.8 and Mozilla Thunderbird version up to 91.8.
CVE-2022-1196 can lead to a use-after-free and potentially exploitable crash.
You can find more information about CVE-2022-1196 at the following references: [Reference 1](https://bugzilla.mozilla.org/show_bug.cgi?id=1750679), [Reference 2](https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/), [Reference 3](https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/).