When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mozilla

Published: 2023-09-11T08:01:17.333Z

Updated: 2023-09-11T08:01:17.333Z

Reserved: 2023-08-29T03:36:49.709Z


Link: CVE-2023-4578

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-09-11T09:15:09.347

Modified: 2023-09-14T03:53:09.187


Link: CVE-2023-4578

JSON object: View

cve-icon Redhat Information

No data.

CWE