{"schema_version":"1.7.2","id":"OESA-2024-1369","modified":"2024-04-12T11:07:34Z","published":"2024-04-12T11:07:34Z","upstream":["CVE-2022-1802"],"summary":"firefox security update","details":"Mozilla Firefox is a standalone web browser, designed for standards compliance and performance.  Its functionality can be enhanced via a plethora of extensions.\r\n\r\nSecurity Fix(es):\r\n\r\nIf an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR \u0026lt; 91.9.1, Firefox \u0026lt; 100.0.2, Firefox for Android \u0026lt; 100.3.0, and Thunderbird \u0026lt; 91.9.1.(CVE-2022-1802)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"firefox","purl":"pkg:rpm/openEuler/firefox\u0026distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"79.0-17.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["firefox-debuginfo-79.0-17.oe2003sp4.aarch64.rpm","firefox-79.0-17.oe2003sp4.aarch64.rpm","firefox-debugsource-79.0-17.oe2003sp4.aarch64.rpm"],"src":["firefox-79.0-17.oe2003sp4.src.rpm"],"x86_64":["firefox-debuginfo-79.0-17.oe2003sp4.x86_64.rpm","firefox-79.0-17.oe2003sp4.x86_64.rpm","mozilla-crashreporter-firefox-debuginfo-79.0-17.oe2003sp4.x86_64.rpm","firefox-debugsource-79.0-17.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1369"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1802"}],"database_specific":{"severity":"High"}}