Hide Forgot
A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2018-16/#CVE-2018-12363
Acknowledgments: Name: the Mozilla project Upstream: Nils
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:2112 https://access.redhat.com/errata/RHSA-2018:2112
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2113 https://access.redhat.com/errata/RHSA-2018:2113
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2252 https://access.redhat.com/errata/RHSA-2018:2252
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:2251 https://access.redhat.com/errata/RHSA-2018:2251