First published: Tue Apr 11 2023(Updated: )
An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash. *This bug only affects Firefox and Thunderbird for macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <102.10 | 102.10 |
Mozilla Firefox | <112 | 112 |
All of | ||
Mozilla Firefox | =112 | |
Google Android | ||
All of | ||
Mozilla Focus | =112 | |
Google Android | ||
<102.10 | 102.10 | |
<102.10 | 102.10 | |
Mozilla Firefox | <112.0 | |
Mozilla Firefox ESR | <102.10 | |
Mozilla Thunderbird | <102.10 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-29531 is a vulnerability that allows an attacker to cause an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash.
This bug only affects Thunderbird for macOS. Other operating systems are unaffected.
CVE-2023-29531 has a severity level of high.
To fix CVE-2023-29531, update Thunderbird for macOS to version 102.10 or higher.
You can find more information about CVE-2023-29531 on the Mozilla Security Advisories page.