{
  "schema_version": "1.6.2",
  "id": "MGASA-2022-0093",
  "published": "2022-03-08T18:10:44Z",
  "modified": "2022-03-08T17:32:23Z",
  "summary": "Updated firefox packages fix security vulnerabilities",
  "details": "An attacker could have caused a use-after-free by forcing a text reflow in an\nSVG object leading to a potentially exploitable crash (CVE-2022-26381).\n\nWhen resizing a popup after requesting fullscreen access, the popup would not\ndisplay the fullscreen notification (CVE-2022-26383).\n\nIf an attacker could control the contents of an iframe sandboxed with\nallow-popups but not allow-scripts, they were able to craft a link that, when\nclicked, would lead to JavaScript execution in violation of the sandbox\n(CVE-2022-26384).\n\nPreviously Firefox for macOS and Linux would download temporary files to a\nuser-specific directory in /tmp, but this behavior was changed to download\nthem to /tmp where they could be affected by other local users. This behavior\nwas reverted to the original, user-specific directory (CVE-2022-26386).\n\nWhen installing an add-on, Firefox verified the signature before prompting\nthe user; but while the user was confirming the prompt, the underlying add-on\nfile could have been modified and Firefox would not have noticed\n(CVE-2022-26387).\n",
  "related": [
    "CVE-2022-26381",
    "CVE-2022-26383",
    "CVE-2022-26384",
    "CVE-2022-26386",
    "CVE-2022-26387"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2022-0093.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=30134"
    },
    {
      "type": "REPORT",
      "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11/"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:8",
        "name": "firefox",
        "purl": "pkg:rpm/mageia/firefox?arch=source&distro=mageia-8"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "91.7.0-1.mga8"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:8",
        "name": "firefox-l10n",
        "purl": "pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-8"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "91.7.0-1.mga8"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
