QID 356198

Date Published: 2023-09-28

QID 356198: Amazon Linux Security Advisory for firefox : ALASFIREFOX-2023-013

mozilla developers and community members julian hector, randell jesup, gabriele svelto, tyson smith, christian holler, and masayuki nakano reported memory safety bugs present in firefox 94.
Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
This vulnerability affects firefox < 95, firefox esr < 91.4.0, and thunderbird < 91.4.0. (
( CVE-2021-4129) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of if an attacker corrupted an object prototype, they could set undesired attributes on a javascript object, leading to privileged code execution. (
( CVE-2022-2200) an out-of-bounds read can occur when decoding h264 video.
This results in a potentially exploitable crash.
This vulnerability affects firefox esr < 102.3, thunderbird < 102.3, and firefox < 105. (
( CVE-2022-3266) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of an iframe that was not permitted to run scripts could do so if the user clicked on a `javascript:` link. (
( CVE-2022-34468) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of navigations between xml documents that may have led to a use-after-free problem and a potentially exploitable crash. (
( CVE-2022-34470) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue that if a pac url was set and the server that hosts the pac was not reachable, ocsp requests are blocked, resulting in incorrect error pages being shown. (
( CVE-2022-34472) a flaw was found in mozilla.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALASFIREFOX-2023-013 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALASFIREFOX-2023-013 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASFIREFOX-2023-013.html