By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-28282.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "99.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.8"
}
]
}
]