First published: Tue Sep 20 2022(Updated: )
Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <102.3 | 102.3 |
<105 | 105 | |
<102.3 | 102.3 | |
<102.3 | 102.3 | |
Mozilla Firefox | <105.0 | |
Mozilla Firefox ESR | <102.3 | |
Mozilla Thunderbird | <102.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-40960 is a vulnerability in Firefox ESR, Thunderbird, and Firefox that allows concurrent use of the URL parser with non-UTF-8 data, leading to a use-after-free and potentially exploitable crash.
Firefox ESR versions below 102.3, Thunderbird versions below 102.3, and Firefox versions below 105 are affected by CVE-2022-40960.
CVE-2022-40960 has a severity value of 6.5, which is considered high.
To fix CVE-2022-40960, update to Firefox ESR version 102.3 or later, Thunderbird version 102.3 or later, or Firefox version 105 or later.
You can find more information about CVE-2022-40960 in the following references: - [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1787633) - [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2022-42/) - [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2022-40/)