First published: Tue Mar 14 2023(Updated: )
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of invalidating JIT code while following an iterator. The newly generated code could be overwritten incorrectly, leading to a potentially exploitable crash.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <0:102.9.0-3.el7_9 | 0:102.9.0-3.el7_9 |
redhat/thunderbird | <0:102.9.0-1.el7_9 | 0:102.9.0-1.el7_9 |
redhat/firefox | <0:102.9.0-3.el8_7 | 0:102.9.0-3.el8_7 |
redhat/thunderbird | <0:102.9.0-1.el8_7 | 0:102.9.0-1.el8_7 |
redhat/thunderbird | <0:102.9.0-2.el8_1 | 0:102.9.0-2.el8_1 |
redhat/firefox | <0:102.9.0-4.el8_1 | 0:102.9.0-4.el8_1 |
redhat/thunderbird | <0:102.9.0-2.el8_2 | 0:102.9.0-2.el8_2 |
redhat/firefox | <0:102.9.0-4.el8_2 | 0:102.9.0-4.el8_2 |
redhat/firefox | <0:102.9.0-4.el8_4 | 0:102.9.0-4.el8_4 |
redhat/thunderbird | <0:102.9.0-2.el8_4 | 0:102.9.0-2.el8_4 |
redhat/firefox | <0:102.9.0-3.el8_6 | 0:102.9.0-3.el8_6 |
redhat/thunderbird | <0:102.9.0-1.el8_6 | 0:102.9.0-1.el8_6 |
redhat/firefox | <0:102.9.0-3.el9_1 | 0:102.9.0-3.el9_1 |
redhat/thunderbird | <0:102.9.0-1.el9_1 | 0:102.9.0-1.el9_1 |
redhat/firefox | <0:102.9.0-3.el9_0 | 0:102.9.0-3.el9_0 |
redhat/thunderbird | <0:102.9.0-1.el9_0 | 0:102.9.0-1.el9_0 |
Mozilla Thunderbird | <102.9 | 102.9 |
Mozilla Firefox ESR | <102.9 | 102.9 |
redhat/firefox | <102.9 | 102.9 |
redhat/thunderbird | <102.9 | 102.9 |
Mozilla Firefox | <111 | 111 |
Mozilla Firefox | <111.0 | |
Mozilla Firefox ESR | <102.9 | |
Mozilla Thunderbird | <102.9 | |
ubuntu/firefox | <111.0+ | 111.0+ |
ubuntu/firefox | <111.0+ | 111.0+ |
ubuntu/mozjs102 | <102.11.0-0ubuntu0.22.04.1 | 102.11.0-0ubuntu0.22.04.1 |
ubuntu/mozjs102 | <102.11.0-0ubuntu0.22.10.1 | 102.11.0-0ubuntu0.22.10.1 |
ubuntu/mozjs102 | <102.11.0-0ubuntu0.23.04.1 | 102.11.0-0ubuntu0.23.04.1 |
ubuntu/thunderbird | <1:102.9.0+ | 1:102.9.0+ |
ubuntu/thunderbird | <1:102.9.0+ | 1:102.9.0+ |
ubuntu/thunderbird | <1:102.9.0+ | 1:102.9.0+ |
ubuntu/thunderbird | <1:102.9.0+ | 1:102.9.0+ |
debian/firefox | 129.0-1 | |
debian/firefox-esr | 115.12.0esr-1~deb11u1 115.13.0esr-1~deb11u1 115.12.0esr-1~deb12u1 115.13.0esr-1~deb12u1 115.13.0esr-2 115.14.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.13.0-1~deb11u1 1:115.12.0-1~deb12u1 1:115.13.0-1~deb12u1 1:115.13.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2023-25751 is high (7).
Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9 are affected by CVE-2023-25751.
You can fix CVE-2023-25751 in Firefox by updating to version 111 or higher.
You can fix CVE-2023-25751 in Firefox ESR by updating to version 102.9 or higher.
You can fix CVE-2023-25751 in Thunderbird by updating to version 102.9 or higher.