The application failed to account for exceptions thrown by the loadManifestFromFile method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed.  Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "133.0+build2-0ubuntu0.20.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "133.0+build2-0ubuntu0.20.04.1"
        },
        {
            "binary_name": "firefox-geckodriver",
            "binary_version": "133.0+build2-0ubuntu0.20.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "133.0+build2-0ubuntu0.20.04.1"
        }
    ]
}