{"id":"ALSA-2022:0818","summary":"Critical: firefox security update","details":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 91.7.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485)\n\n* Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486)\n\n* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)\n\n* expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution (CVE-2022-25236)\n\n* expat: Integer overflow in storeRawNames() (CVE-2022-25315)\n\n* Mozilla: Use-after-free in text reflows (CVE-2022-26381)\n\n* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383)\n\n* Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384)\n\n* Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387)\n\n* Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T04:14:33.329363Z","published":"2022-03-10T14:36:51Z","related":["CVE-2022-25235","CVE-2022-25236","CVE-2022-25315","CVE-2022-26381","CVE-2022-26383","CVE-2022-26384","CVE-2022-26386","CVE-2022-26387","CVE-2022-26485","CVE-2022-26486"],"references":[{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-25235"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-25236"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-25315"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26381"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26383"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26384"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26386"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26387"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26485"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26486"}],"affected":[{"package":{"name":"firefox","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.7.0-3.el8_5.alma"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:0818.json"}}],"schema_version":"1.7.3"}