Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1758062 | Exploit Issue Tracking Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-09/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2022-12-22T00:00:00
Updated: 2022-12-22T00:00:00
Reserved: 2022-03-04T00:00:00
Link: CVE-2022-26485
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-22T20:15:22.563
Modified: 2022-12-30T16:22:40.097
Link: CVE-2022-26485
JSON object: View
Redhat Information
No data.
CWE