MGASA-2022-0251

Source
https://advisories.mageia.org/MGASA-2022-0251.html
Import Source
https://advisories.mageia.org/MGASA-2022-0251.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0251
Related
Published
2022-07-05T19:11:26Z
Modified
2022-07-05T18:18:16Z
Summary
Updated firefox packages fix security vulnerability
Details

If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution (CVE-2022-2200).

An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy (CVE-2022-31744).

Content Security Policy sandbox header without allow-scripts can be bypassed via retargeted javascript: URI. An iframe that was not permitted to run scripts could do so if the user clicked on a javascript: link (CVE-2022-34468).

Navigations between XML documents may have led to a use-after-free in nsSHistory and potentially exploitable crash (CVE-2022-34470).

If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown (CVE-2022-34472).

A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks (CVE-2022-34479).

In the nsTArray_Impl::ReplaceElementsAt() function, an integer overflow could have occurred when the number of elements to replace was too large for the container (CVE-2022-34481).

The Mozilla Fuzzing Team reported potential vulnerabilities present in Firefox ESR 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort

References
Credits

Affected packages

Mageia:8 / firefox

Package

Name
firefox
Purl
pkg:rpm/mageia/firefox?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.11.0-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / firefox-l10n

Package

Name
firefox-l10n
Purl
pkg:rpm/mageia/firefox-l10n?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.11.0-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / rootcerts

Package

Name
rootcerts
Purl
pkg:rpm/mageia/rootcerts?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20220610.00-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / nss

Package

Name
nss
Purl
pkg:rpm/mageia/nss?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.80.0-1.mga8

Ecosystem specific

{
    "section": "core"
}