A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1840144 | Issue Tracking Permissions Required |
| https://www.mozilla.org/security/advisories/mfsa2023-54/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2023-55/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2023-56/ | Vendor Advisory |
| https://www.debian.org/security/2023/dsa-5581 | Third Party Advisory |
| https://www.debian.org/security/2023/dsa-5582 | Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html | |
| https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html | |
| https://security.gentoo.org/glsa/202401-10 |
Information
Published : 2023-12-19 14:15
Updated : 2024-01-07 11:15
NVD link : CVE-2023-6859
Mitre link : CVE-2023-6859
JSON object : View
Products Affected
mozilla
- firefox_esr
- thunderbird
- firefox
debian
- debian_linux
CWE
CWE-416
Use After Free
