CVE-2022-22752
Published: 13 January 2022
Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 96.
Notes
| Author | Note |
|---|---|
| tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
firefox Launchpad, Ubuntu, Debian |
bionic |
Released
(96.0+build2-0ubuntu0.18.04.1)
|
| focal |
Released
(96.0+build2-0ubuntu0.20.04.1)
|
|
| hirsute |
Released
(96.0+build2-0ubuntu0.21.04.1)
|
|
| impish |
Released
(96.0+build2-0ubuntu0.21.10.1)
|
|
| jammy |
Released
(96.0+build2-0ubuntu1)
|
|
| kinetic |
Released
(96.0+build2-0ubuntu1)
|
|
| lunar |
Released
(96.0+build2-0ubuntu1)
|
|
| upstream |
Released
(96)
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.8 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |