At any point of the digital transition,…
Mozilla Firefox is an open source Web browser of the Mozilla Foundation in the United States.
Firefox has release a patch for a buffer overflow vulnerability.
Recently Firefox vulnerabilities reports:
1) CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash.
2) CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network’s hosts as well as services running on the user’s local machine utilizing WebRTC connections.
3) CVE-2021-23983: Transitions for invalid ::marker properties resulted in memory corruption
By causing a transition on a parent node by removing a CSS rule, an invalid property for a marker could have been applied, resulting in memory corruption and a potentially exploitable crash.
We recommended you to download the lastest Firefox update.