SpiderMonkey JavaScript library
Security Fix(es):
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.(CVE-2022-34481)
{
"severity": "High"
}{
"aarch64": [
"mozjs91-debuginfo-91.6.0-5.oe2203sp1.aarch64.rpm",
"mozjs91-devel-91.6.0-5.oe2203sp1.aarch64.rpm",
"mozjs91-debugsource-91.6.0-5.oe2203sp1.aarch64.rpm",
"mozjs91-91.6.0-5.oe2203sp1.aarch64.rpm",
"libmozjs-91-0-91.6.0-5.oe2203sp1.aarch64.rpm"
],
"x86_64": [
"mozjs91-debugsource-91.6.0-5.oe2203sp1.x86_64.rpm",
"mozjs91-devel-91.6.0-5.oe2203sp1.x86_64.rpm",
"mozjs91-91.6.0-5.oe2203sp1.x86_64.rpm",
"libmozjs-91-0-91.6.0-5.oe2203sp1.x86_64.rpm",
"mozjs91-debuginfo-91.6.0-5.oe2203sp1.x86_64.rpm"
],
"src": [
"mozjs91-91.6.0-5.oe2203sp1.src.rpm"
]
}