CVE-2022-1529 log
Source |
|
Severity | Critical |
Remote | Yes |
Type | Arbitrary code execution |
Description | An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-2729 | thunderbird | 91.9.0-1 | 91.9.1-1 | Critical | Fixed | |
AVG-2728 | firefox | 100.0.1-1 | 100.0.2-1 | Critical | Fixed |
References |
---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1770048 |