First published: Tue Jan 11 2022(Updated: )
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <91.5 | 91.5 |
<96 | 96 | |
<91.5 | 91.5 | |
<91.5 | 91.5 | |
Mozilla Firefox | <96.0 | |
Mozilla Firefox ESR | <91.5 | |
Mozilla Thunderbird | <91.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-22738 is a vulnerability that allows an attacker to access out of bounds memory by applying a CSS filter effect, potentially leading to a heap-buffer-overflow and a potentially exploitable crash.
CVE-2022-22738 affects Mozilla Firefox ESR versions earlier than 91.5, Mozilla Firefox versions earlier than 96, and Mozilla Thunderbird versions earlier than 91.5.
CVE-2022-22738 has a severity rating of 8.8 (High).
To fix CVE-2022-22738, update your Mozilla Firefox ESR to version 91.5 or later, update your Mozilla Firefox to version 96 or later, or update your Mozilla Thunderbird to version 91.5 or later.
You can find more information about CVE-2022-22738 on the Mozilla Bugzilla page and the Mozilla security advisories: mfsa2022-03 and mfsa2022-01.