When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1730156 | Issue Tracking Permissions Required Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202202-03 | Third Party Advisory |
https://security.gentoo.org/glsa/202208-14 | Third Party Advisory |
https://www.debian.org/security/2021/dsa-5026 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5034 | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-48/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-49/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-50/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2021-12-08T21:21:59
Updated: 2022-08-10T05:13:06
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38504
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-08T22:15:08.790
Modified: 2022-12-09T15:27:20.023
Link: CVE-2021-38504
JSON object: View
Redhat Information
No data.
CWE