First published: Tue Mar 08 2022(Updated: )
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified, and Firefox would not have noticed.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <0:91.7.0-3.el7_9 | 0:91.7.0-3.el7_9 |
redhat/thunderbird | <0:91.7.0-2.el7_9 | 0:91.7.0-2.el7_9 |
redhat/firefox | <0:91.7.0-3.el8_5 | 0:91.7.0-3.el8_5 |
redhat/thunderbird | <0:91.7.0-2.el8_5 | 0:91.7.0-2.el8_5 |
redhat/firefox | <0:91.7.0-3.el8_1 | 0:91.7.0-3.el8_1 |
redhat/thunderbird | <0:91.7.0-2.el8_1 | 0:91.7.0-2.el8_1 |
redhat/firefox | <0:91.7.0-3.el8_2 | 0:91.7.0-3.el8_2 |
redhat/thunderbird | <0:91.7.0-2.el8_2 | 0:91.7.0-2.el8_2 |
redhat/firefox | <0:91.7.0-3.el8_4 | 0:91.7.0-3.el8_4 |
redhat/thunderbird | <0:91.7.0-2.el8_4 | 0:91.7.0-2.el8_4 |
redhat/firefox | <91.7 | 91.7 |
redhat/thunderbird | <91.7 | 91.7 |
Thunderbird | <91.7 | 91.7 |
Firefox | <98.0 | |
Firefox ESR | <91.7 | |
Thunderbird | <91.7 | |
Firefox | <98 | 98 |
Firefox ESR | <91.7 | 91.7 |
<98.0 | ||
<91.7 | ||
<91.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this flaw is CVE-2022-26387.
The severity of CVE-2022-26387 is high (7).
The software affected by CVE-2022-26387 includes Mozilla Firefox ESR (version up to 91.7), Firefox (version up to 98), and Thunderbird (version up to 91.7).
To fix CVE-2022-26387, update Mozilla Firefox ESR to version 91.7 or later, Firefox to version 98 or later, and Thunderbird to version 91.7 or later.
More information about CVE-2022-26387 can be found in the following references: [Link 1](https://bugzilla.mozilla.org/show_bug.cgi?id=1752979), [Link 2](https://www.mozilla.org/en-US/security/advisories/mfsa2022-12/), [Link 3](https://www.mozilla.org/en-US/security/advisories/mfsa2022-10/).