CVE-2022-28282
22.12.2022, 20:15
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 99.0 |
mozilla | firefox_esr | 𝑥 < 91.8 |
mozilla | thunderbird | 𝑥 < 91.8 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||||
firefox-esr |
| ||||||||||||
thunderbird |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||||||||
thunderbird |
|
Common Weakness Enumeration
References