MGASA-2022-0093

Source
https://advisories.mageia.org/MGASA-2022-0093.html
Import Source
https://advisories.mageia.org/MGASA-2022-0093.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0093
Related
Published
2022-03-08T18:10:44Z
Modified
2022-03-08T17:32:23Z
Summary
Updated firefox packages fix security vulnerabilities
Details

An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash (CVE-2022-26381).

When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification (CVE-2022-26383).

If an attacker could control the contents of an iframe sandboxed with allow-popups but not allow-scripts, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox (CVE-2022-26384).

Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in /tmp, but this behavior was changed to download them to /tmp where they could be affected by other local users. This behavior was reverted to the original, user-specific directory (CVE-2022-26386).

When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed (CVE-2022-26387).

References
Credits

Affected packages

Mageia:8 / firefox

Package

Name
firefox
Purl
pkg:rpm/mageia/firefox?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.7.0-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / firefox-l10n

Package

Name
firefox-l10n
Purl
pkg:rpm/mageia/firefox-l10n?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.7.0-1.mga8

Ecosystem specific

{
    "section": "core"
}