In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1497246 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-24/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-25/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-26/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2022-12-22T00:00:00
Updated: 2022-12-22T00:00:00
Reserved: 2022-06-24T00:00:00
Link: CVE-2022-34481
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-22T20:15:33.500
Modified: 2022-12-30T18:45:26.437
Link: CVE-2022-34481
JSON object: View
Redhat Information
No data.
CWE