CVE Details

Release Date:2023-08-29


When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

See more information about CVE-2023-4578 from MITRE CVE dictionary and NIST NVD

CVSS v3.0 metrics

NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 6.1 Base Metrics: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Access Vector: Network Attack Complexity: Low
Privileges Required: None User Interaction: Required
Scope: Changed Confidentiality Impact: Low
Integrity Impact: Low Availability Impact: None

Errata information

PlatformErrataRelease Date
Oracle Linux version 7 (firefox)ELSA-2023-50192023-09-07
Oracle Linux version 7 (thunderbird)ELSA-2023-49452023-09-05
Oracle Linux version 8 (firefox)ELSA-2023-49522023-09-06
Oracle Linux version 8 (thunderbird)ELSA-2023-49542023-09-06
Oracle Linux version 9 (firefox)ELSA-2023-49582023-09-06
Oracle Linux version 9 (thunderbird)ELSA-2023-49552023-09-06

This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team