In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1497246 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-24/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-25/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-26/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1497246 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-24/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-25/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-26/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-12-22 20:15
Updated : 2025-04-15 18:15
NVD link : CVE-2022-34481
Mitre link : CVE-2022-34481
CVE.ORG link : CVE-2022-34481
JSON object : View
Products Affected
mozilla
- firefox_esr
- firefox
- thunderbird
CWE
CWE-190
Integer Overflow or Wraparound