Bug 2089218 (CVE-2022-1529)

Summary: CVE-2022-1529 Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: erack, jhorak, nobody, stransky, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 100.0.2, firefox 91.9.1, thunderbird 91.9.1 Doc Type: If docs needed, set a value
Doc Text:
The Mozilla Foundation Security Advisory describes this flaw as: An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-27 23:07:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2089203, 2089204, 2089205, 2089206, 2089207, 2089208, 2089209, 2089210, 2089212, 2089234, 2089235, 2089236, 2089237, 2089238, 2089239, 2089240, 2089241, 2089246    
Bug Blocks: 2089201    

Description Mauro Matteo Cascella 2022-05-23 09:06:41 UTC
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process.


External Reference:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-19/#CVE-2022-1529

Comment 1 errata-xmlrpc 2022-05-24 16:35:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:4730 https://access.redhat.com/errata/RHSA-2022:4730

Comment 2 errata-xmlrpc 2022-05-24 17:46:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:4729 https://access.redhat.com/errata/RHSA-2022:4729

Comment 3 errata-xmlrpc 2022-05-26 23:21:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:4773 https://access.redhat.com/errata/RHSA-2022:4773

Comment 4 errata-xmlrpc 2022-05-27 02:49:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:4767 https://access.redhat.com/errata/RHSA-2022:4767

Comment 5 errata-xmlrpc 2022-05-27 02:50:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:4774 https://access.redhat.com/errata/RHSA-2022:4774

Comment 6 errata-xmlrpc 2022-05-27 18:37:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:4770 https://access.redhat.com/errata/RHSA-2022:4770

Comment 7 errata-xmlrpc 2022-05-27 18:52:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:4766 https://access.redhat.com/errata/RHSA-2022:4766

Comment 8 errata-xmlrpc 2022-05-27 19:00:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:4772 https://access.redhat.com/errata/RHSA-2022:4772

Comment 9 errata-xmlrpc 2022-05-27 19:02:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:4768 https://access.redhat.com/errata/RHSA-2022:4768

Comment 10 errata-xmlrpc 2022-05-27 19:09:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:4765 https://access.redhat.com/errata/RHSA-2022:4765

Comment 11 errata-xmlrpc 2022-05-27 19:25:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:4769 https://access.redhat.com/errata/RHSA-2022:4769

Comment 12 errata-xmlrpc 2022-05-27 19:42:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:4776 https://access.redhat.com/errata/RHSA-2022:4776

Comment 13 Product Security DevOps Team 2022-05-27 23:07:22 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-1529