{"id":"MGASA-2022-0220","summary":"Updated firefox/nss/nspr packages fix security vulnerability","details":"A malicious website could have learned the size of a cross-origin resource\nthat supported Range requests (CVE-2022-31736).\n\nA malicious webpage could have caused an out-of-bounds write in WebGL, leading\nto memory corruption and a potentially exploitable crash (CVE-2022-31737).\n\nWhen exiting fullscreen mode, an iframe could have confused the browser about\nthe current state of fullscreen, resulting in potential user confusion or\nspoofing attacks (CVE-2022-31738).\n\nOn arm64, WASM code could have resulted in incorrect assembly generation\nleading to a register allocation problem, and a potentially exploitable crash\n(CVE-2022-31740).\n\nA crafted CMS message could have been processed incorrectly, leading to an\ninvalid memory read, and potentially further memory corruption\n(CVE-2022-31741).\n\nAn attacker could have exploited a timing attack by sending a large number of\nallowCredential entries and detecting the difference between invalid key\nhandles and cross-origin key handles. This could have led to cross-origin\naccount linking in violation of WebAuthn goals (CVE-2022-31742).\n\nMozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla\nFuzzing Team reported memory safety bugs present in Firefox ESR 91.9. Some of\nthese bugs showed evidence of memory corruption and we presume that with\nenough effort some of these could have been exploited to run arbitrary code\n(CVE-2022-31747).\n","modified":"2026-04-16T04:42:22.430358790Z","published":"2022-06-04T20:25:39Z","upstream":["CVE-2022-31736","CVE-2022-31737","CVE-2022-31738","CVE-2022-31740","CVE-2022-31741","CVE-2022-31742","CVE-2022-31747"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0220.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30498"},{"type":"WEB","url":"https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/e9q0AqO8t2k"},{"type":"WEB","url":"https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/ZghhNaaxnUA"},{"type":"WEB","url":"https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21/"}],"affected":[{"package":{"name":"firefox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.10.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0220.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.10.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0220.json"}},{"package":{"name":"nspr","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/nspr?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.34-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0220.json"}},{"package":{"name":"nss","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.79.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0220.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}