


This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash.ĬVE-2020-26978: Internal network hosts could have been probed by a malicious webpage When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type.

This could have been used as a sanitizer bypass.ĬVE-2020-26974: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read.ĬVE-2020-26971: Heap buffer overflow in WebGLĬertain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers.ĬVE-2020-26973: CSS Sanitizer performed incorrect sanitizationĬertain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. The following security vulnerabilities have been fixed in Mozilla Firefox ESR 78.6ĬVE-2020-16042: Operations on a BigInt could have caused uninitialized memory to be exposed
