CVE-2017-5378
Published: 25 January 2017
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
precise |
Released
(51.0.1+build2-0ubuntu0.12.04.1)
|
trusty |
Does not exist
(trusty was released [51.0.1+build2-0ubuntu0.14.04.1])
|
|
upstream |
Released
(51)
|
|
xenial |
Released
(51.0.1+build2-0ubuntu0.16.04.1)
|
|
yakkety |
Released
(51.0.1+build2-0ubuntu0.16.10.1)
|
|
zesty |
Released
(52.0.1+build2-0ubuntu1)
|
|
thunderbird Launchpad, Ubuntu, Debian |
precise |
Released
(1:45.7.0+build1-0ubuntu0.12.04.1)
|
trusty |
Does not exist
(trusty was released [1:45.7.0+build1-0ubuntu0.14.04.1])
|
|
upstream |
Needs triage
|
|
xenial |
Released
(1:45.7.0+build1-0ubuntu0.16.04.1)
|
|
yakkety |
Released
(1:45.7.0+build1-0ubuntu0.16.10.1)
|
|
zesty |
Released
(1:45.7.0+build1-0ubuntu1)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-03/#CVE-2017-5378
- https://ubuntu.com/security/notices/USN-3175-1
- https://ubuntu.com/security/notices/USN-3165-1
- NVD
- Launchpad
- Debian