CVE-2017-7802

Priority
Description
A use-after-free vulnerability can occur when manipulating the DOM during
the resize event of an image element. If these elements have been freed due
to a lack of strong references, a potentially exploitable crash may occur
when the freed elements are accessed. This vulnerability affects
Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Assigned-to
chrisccoulson
Notes
tyhicksmozjs38 contains a copy of the SpiderMonkey JavaScript engine
Package
Upstream:released (55.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [55.0.1+build2-0ubuntu0.14.04.2])
Ubuntu 16.04 LTS (Xenial Xerus):released (55.0.1+build2-0ubuntu0.16.04.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (55.0.2+build1-0ubuntu4)
Ubuntu 19.04 (Disco Dingo):released (55.0.2+build1-0ubuntu4)
Ubuntu 19.10 (Eoan Ermine):released (55.0.2+build1-0ubuntu4)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Package
Priority: Low
Upstream:released (52.3.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1:52.3.0+build1-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):released (1:52.3.0+build1-0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:52.4.0+build1-0ubuntu2)
Ubuntu 19.04 (Disco Dingo):released (1:52.4.0+build1-0ubuntu2)
Ubuntu 19.10 (Eoan Ermine):released (1:52.4.0+build1-0ubuntu2)
More Information

Updated: 2019-12-05 21:08:48 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)