A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird < 128.10.
The product reads data past the end, or before the beginning, of the intended buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 128.10 (excluding) |
Firefox | Mozilla | * | 138.0 (excluding) |
Thunderbird | Mozilla | * | 128.10.0 (excluding) |
Thunderbird | Mozilla | * | 138.0 (excluding) |
Red Hat Enterprise Linux 7 Extended Lifecycle Support | RedHat | firefox-0:128.10.0-1.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | firefox-0:128.10.0-1.el8_10 | * |
Red Hat Enterprise Linux 9 | RedHat | firefox-0:128.10.0-1.el9_5 | * |
Red Hat Enterprise Linux 9 | RedHat | thunderbird-0:128.10.0-1.el9_5 | * |
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | RedHat | firefox-0:128.10.0-1.el9_0 | * |
Red Hat Enterprise Linux 9.2 Extended Update Support | RedHat | firefox-0:128.10.0-1.el9_2 | * |
Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | firefox-0:128.10.0-1.el9_4 | * |
Firefox | Ubuntu | focal | * |
Firefox | Ubuntu | upstream | * |
Mozjs102 | Ubuntu | esm-apps/noble | * |
Mozjs102 | Ubuntu | jammy | * |
Mozjs102 | Ubuntu | noble | * |
Mozjs115 | Ubuntu | devel | * |
Mozjs115 | Ubuntu | noble | * |
Mozjs115 | Ubuntu | oracular | * |
Mozjs115 | Ubuntu | plucky | * |
Mozjs52 | Ubuntu | esm-infra/bionic | * |
Mozjs52 | Ubuntu | focal | * |
Mozjs68 | Ubuntu | focal | * |
Mozjs78 | Ubuntu | jammy | * |
Mozjs91 | Ubuntu | jammy | * |
Thunderbird | Ubuntu | focal | * |
Thunderbird | Ubuntu | jammy | * |
Thunderbird | Ubuntu | upstream | * |