CVE-2022-22752
Published: 13 January 2022
Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 96.
Notes
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
upstream |
Released
(96)
|
bionic |
Released
(96.0+build2-0ubuntu0.18.04.1)
|
|
focal |
Released
(96.0+build2-0ubuntu0.20.04.1)
|
|
hirsute |
Released
(96.0+build2-0ubuntu0.21.04.1)
|
|
impish |
Released
(96.0+build2-0ubuntu0.21.10.1)
|
|
jammy |
Released
(96.0+build2-0ubuntu1)
|
|
kinetic |
Released
(96.0+build2-0ubuntu1)
|
|
lunar |
Released
(96.0+build2-0ubuntu1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |