QID 356274

Date Published: 2023-09-28

QID 356274: Amazon Linux Security Advisory for firefox : ALASFIREFOX-2023-010

a vulnerability was found in expat.
With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that xml_resumeparser directly uses the internalentityprocessor as its processor.
If the subsequent parse includes some unclosed tags, this will return without calling storerawnames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself.
Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur.
Using this vulnerability in the docontent function allows an attacker to triage a denial of service or potentially arbitrary code execution. (
( CVE-2022-40674) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue that when injecting an html base element; some requests would ignore the csps base-uri settings and accept the injected elements base instead. (
( CVE-2022-40956) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of inconsistent data in the instruction and data cache when creating wasm code, which could lead to a potentially exploitable crash. (
( CVE-2022-40957) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue that by injecting a cookie with certain special characters, an attacker on a shared subdomain, which is not a secure context, could set and overwrite cookies from a secure context, leading to session fixation and other attacks. (
( CVE-2022-40958) a flaw was found in mozilla.
( CVE-2022-40959) a flaw was found in mozilla.
( CVE-2022-40961) a flaw was found in mozilla.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALASFIREFOX-2023-010 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALASFIREFOX-2023-010 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASFIREFOX-2023-010.html