First published: Tue Jan 07 2025(Updated: )
Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19.
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <134 | |
Firefox ESR | <128.6<115.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2336165 is considered significant due to the potential for a use-after-free vulnerability that can lead to crashes and exploitation.
To fix REDHAT-BUG-2336165, update your Firefox to version 134 or later and Firefox ESR to version 128.6 or 115.19 and above.
REDHAT-BUG-2336165 affects Firefox versions below 134, Firefox ESR versions below 128.6, and Firefox ESR versions below 115.19.
A use-after-free vulnerability, like in REDHAT-BUG-2336165, occurs when a program continues to use a memory reference after it has been freed, potentially leading to arbitrary code execution.
Yes, if successfully triggered, REDHAT-BUG-2336165 can potentially be exploited, leading to application crashes or uncontrolled behaviors.