Your submission was sent successfully! Close

CVE-2017-7813

Published: 2 October 2017

Inside the JavaScript parser, a cast of an integer to a narrower type can result in data read from outside the buffer being parsed. This usually results in a non-exploitable crash, but can leak a limited amount of information from memory if it matches JavaScript identifier syntax. This vulnerability affects Firefox < 56.

Notes

AuthorNote
tyhicks
mozjs contains a copy of the SpiderMonkey JavaScript engine
Priority

Medium

CVSS 3 base score: 8.2

Status

Package Release Status
firefox
Launchpad, Ubuntu, Debian
artful
Released (56.0+build6-0ubuntu1)
bionic
Released (56.0+build6-0ubuntu1)
cosmic
Released (56.0+build6-0ubuntu1)
disco
Released (56.0+build6-0ubuntu1)
eoan
Released (56.0+build6-0ubuntu1)
focal
Released (56.0+build6-0ubuntu1)
groovy
Released (56.0+build6-0ubuntu1)
hirsute
Released (56.0+build6-0ubuntu1)
impish
Released (56.0+build6-0ubuntu1)
jammy
Released (56.0+build6-0ubuntu1)
precise Does not exist

trusty Does not exist
(trusty was released [56.0+build6-0ubuntu0.14.04.1])
upstream
Released (56.0)
xenial
Released (56.0+build6-0ubuntu0.16.04.1)
zesty
Released (56.0+build6-0ubuntu0.17.04.1)
mozjs38
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Needs triage

cosmic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

zesty Ignored
(reached end-of-life)
mozjs52
Launchpad, Ubuntu, Debian
artful Not vulnerable

bionic Not vulnerable

cosmic Not vulnerable

disco Not vulnerable

eoan Not vulnerable

focal Not vulnerable

groovy Not vulnerable

hirsute Does not exist

impish Does not exist

jammy Does not exist

precise Does not exist

trusty Does not exist

upstream Not vulnerable

xenial Does not exist

zesty Does not exist