By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2971-1 | firefox-esr security update |
Debian DLA |
DLA-2978-1 | thunderbird security update |
Debian DSA |
DSA-5113-1 | firefox-esr security update |
Debian DSA |
DSA-5118-1 | thunderbird security update |
EUVD |
EUVD-2022-32734 | By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
Ubuntu USN |
USN-5370-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-5393-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-04-15T20:09:15.856Z
Reserved: 2022-03-31T00:00:00.000Z
Link: CVE-2022-28282
Updated: 2024-08-03T05:48:37.678Z
Status : Modified
Published: 2022-12-22T20:15:23.430
Modified: 2025-04-15T20:15:35.830
Link: CVE-2022-28282
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN