A use-after-free was discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could exploit this to execute arbitrary code.
{ "binaries": [ { "binary_version": "82.0.3+build1-0ubuntu0.16.04.1", "binary_name": "firefox" }, { "binary_version": "82.0.3+build1-0ubuntu0.16.04.1", "binary_name": "firefox-dev" }, { "binary_version": "82.0.3+build1-0ubuntu0.16.04.1", "binary_name": "firefox-geckodriver" }, { "binary_version": "82.0.3+build1-0ubuntu0.16.04.1", "binary_name": "firefox-mozsymbols" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "82.0.3+build1-0ubuntu0.18.04.1", "binary_name": "firefox" }, { "binary_version": "82.0.3+build1-0ubuntu0.18.04.1", "binary_name": "firefox-dev" }, { "binary_version": "82.0.3+build1-0ubuntu0.18.04.1", "binary_name": "firefox-geckodriver" }, { "binary_version": "82.0.3+build1-0ubuntu0.18.04.1", "binary_name": "firefox-mozsymbols" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "82.0.3+build1-0ubuntu0.20.04.1", "binary_name": "firefox" }, { "binary_version": "82.0.3+build1-0ubuntu0.20.04.1", "binary_name": "firefox-dev" }, { "binary_version": "82.0.3+build1-0ubuntu0.20.04.1", "binary_name": "firefox-geckodriver" }, { "binary_version": "82.0.3+build1-0ubuntu0.20.04.1", "binary_name": "firefox-mozsymbols" } ], "availability": "No subscription required" }