Inside the JavaScript parser, a cast of an integer to a narrower type can
result in data read from outside the buffer being parsed. This usually
results in a non-exploitable crash, but can leak a limited amount of
information from memory if it matches JavaScript identifier syntax. This
vulnerability affects Firefox < 56.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 18.04 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 18.10 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 19.04 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 19.10 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 20.04 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 20.10 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 21.04 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 21.10 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |
ubuntu | 22.04 | noarch | firefox | < 56.0+build6-0ubuntu1 | UNKNOWN |