Description
Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6.
Problem types
Use-after-free when breaking lines in text
Product status
Credits
Irvan Kurniawan
References
lists.debian.org/debian-lts-announce/2025/01/msg00004.html
bugzilla.mozilla.org/show_bug.cgi?id=1915535
www.mozilla.org/security/advisories/mfsa2025-01/
www.mozilla.org/security/advisories/mfsa2025-02/
www.mozilla.org/security/advisories/mfsa2025-03/
www.mozilla.org/security/advisories/mfsa2025-04/
www.mozilla.org/security/advisories/mfsa2025-05/