When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2023-09-11T08:01:17.333Z
Updated: 2024-09-19T20:02:19.081Z
Reserved: 2023-08-29T03:36:49.709Z
Link: CVE-2023-4578
Vulnrichment
Updated: 2024-08-02T07:31:06.622Z
NVD
Status : Modified
Published: 2023-09-11T09:15:09.347
Modified: 2024-11-21T08:35:28.180
Link: CVE-2023-4578
Redhat