CVE-2022-26486
Published: 6 March 2022
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
Notes
| Author | Note |
|---|---|
| tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
firefox Launchpad, Ubuntu, Debian |
bionic |
Released
(97.0.2+build1-0ubuntu0.18.04.1)
|
| focal |
Released
(97.0.2+build1-0ubuntu0.20.04.1)
|
|
| impish |
Released
(97.0.2+build1-0ubuntu0.21.10.1)
|
|
| jammy |
Released
(1:1snap1-0ubuntu1)
|
|
| kinetic |
Released
(1:1snap1-0ubuntu1)
|
|
| lunar |
Released
(1:1snap1-0ubuntu1)
|
|
| upstream |
Released
(97.0.2)
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 9.6 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |