QID 356488

Date Published: 2023-11-08

QID 356488: Amazon Linux Security Advisory for firefox : ALAS2FIREFOX-2023-010

2023-09-27:( CVE-2021-28429 was added to this advisory. integer overflow vulnerability in av_timecode_make_string in libavutil/timecode.c in ffmpeg version 4.3.2, allows local attackers to cause a denial of service (dos) via crafted .mov file. (
( CVE-2021-28429) a vulnerability was found in expat.
With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that xml_resumeparser directly uses the internalentityprocessor as its processor.
If the subsequent parse includes some unclosed tags, this will return without calling storerawnames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself.
Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur.
Using this vulnerability in the docontent function allows an attacker to triage a denial of service or potentially arbitrary code execution. (
( CVE-2022-40674) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue that when injecting an html base element; some requests would ignore the csps base-uri settings and accept the injected elements base instead. (
( CVE-2022-40956) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of inconsistent data in the instruction and data cache when creating wasm code, which could lead to a potentially exploitable crash. (
( CVE-2022-40957) a flaw was found in mozilla.
( CVE-2022-40958) a flaw was found in mozilla.
( CVE-2022-40959) a flaw was found in mozilla.
An attacker could cause of denial-of-service style crash by exploiting this vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2FIREFOX-2023-010 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2FIREFOX-2023-010 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASFIREFOX-2023-010.html