First published: Tue Jan 23 2024(Updated: )
An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <122 | 122 |
Mozilla Firefox ESR | <115.9 | 115.9 |
Mozilla Thunderbird | <115.9 | 115.9 |
Mozilla Firefox | <122.0 | |
redhat/firefox | <115.9 | 115.9 |
redhat/thunderbird | <115.9 | 115.9 |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.4.0esr-1 | |
debian/nss | <=2:3.61-1+deb11u3<=2:3.87.1-1 | 2:3.61-1+deb11u4 2:3.87.1-1+deb12u1 2:3.105-2 2:3.106-1 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.3esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.3esr-1~deb12u1 1:128.4.3esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)