Your submission was sent successfully! Close

CVE-2016-9904

Published: 13 December 2016

An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
firefox
Launchpad, Ubuntu, Debian
precise
Released (50.1.0+build2-0ubuntu0.12.04.1)
trusty Does not exist
(trusty was released [50.1.0+build2-0ubuntu0.14.04.1])
upstream
Released (released 50.1.0)
xenial
Released (50.1.0+build2-0ubuntu0.16.04.1)
yakkety
Released (50.1.0+build2-0ubuntu0.16.10.1)
thunderbird
Launchpad, Ubuntu, Debian
precise
Released (1:45.7.0+build1-0ubuntu0.12.04.1)
trusty Does not exist
(trusty was released [1:45.7.0+build1-0ubuntu0.14.04.1])
upstream Needs triage

xenial
Released (1:45.7.0+build1-0ubuntu0.16.04.1)
yakkety
Released (1:45.7.0+build1-0ubuntu0.16.10.1)