First published: Tue Jun 28 2022(Updated: )
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox ESR | <91.11 | 91.11 |
Thunderbird | <102 | 102 |
Thunderbird | <91.11 | 91.11 |
Firefox | <102.0 | |
Firefox ESR | <91.11 | |
Thunderbird | <91.11 | |
Firefox | <102 | 102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-34481 has been classified as a moderate severity vulnerability.
To fix CVE-2022-34481, update Firefox or Thunderbird to version 102 or Firefox ESR and Thunderbird to version 91.11 or later.
CVE-2022-34481 affects Firefox versions prior to 102, Firefox ESR versions prior to 91.11, and Thunderbird versions prior to 102 and 91.11.
CVE-2022-34481 is an integer overflow vulnerability that can occur in the nsTArray_Impl::ReplaceElementsAt() function.
The vendor for CVE-2022-34481 is Mozilla.