Bug 2136158 (CVE-2022-42929)

Summary: CVE-2022-42929 Mozilla: Denial of Service via window.print
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: erack, jhorak, nobody, stransky, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 102.4, thunderbird 102.4 Doc Type: ---
Doc Text:
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of a website called `window.print()` causing a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-02 14:35:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2133355, 2133356, 2133357, 2133358, 2133359, 2133360, 2133361, 2133362, 2133363, 2133364, 2133365, 2133366, 2133369, 2133370, 2133371, 2133372, 2133373, 2133374, 2133375, 2133376, 2133377, 2133378    
Bug Blocks: 2133352    

Description Mauro Matteo Cascella 2022-10-19 13:02:38 UTC
If a website called `window.print()` in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings.

External References:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-45/#CVE-2022-42929
https://www.mozilla.org/en-US/security/advisories/mfsa2022-46/#CVE-2022-42929

Comment 1 errata-xmlrpc 2022-10-20 14:28:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:7066 https://access.redhat.com/errata/RHSA-2022:7066

Comment 2 errata-xmlrpc 2022-10-20 15:00:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:7068 https://access.redhat.com/errata/RHSA-2022:7068

Comment 3 errata-xmlrpc 2022-10-20 15:08:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:7069 https://access.redhat.com/errata/RHSA-2022:7069

Comment 4 errata-xmlrpc 2022-10-20 15:09:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7070 https://access.redhat.com/errata/RHSA-2022:7070

Comment 5 errata-xmlrpc 2022-10-20 15:19:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:7072 https://access.redhat.com/errata/RHSA-2022:7072

Comment 6 errata-xmlrpc 2022-10-20 15:38:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7071 https://access.redhat.com/errata/RHSA-2022:7071

Comment 7 errata-xmlrpc 2022-10-25 14:01:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7178 https://access.redhat.com/errata/RHSA-2022:7178

Comment 8 errata-xmlrpc 2022-10-25 14:34:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:7182 https://access.redhat.com/errata/RHSA-2022:7182

Comment 9 errata-xmlrpc 2022-10-25 14:41:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:7183 https://access.redhat.com/errata/RHSA-2022:7183

Comment 10 errata-xmlrpc 2022-10-25 14:44:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:7181 https://access.redhat.com/errata/RHSA-2022:7181

Comment 11 errata-xmlrpc 2022-10-25 14:51:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:7184 https://access.redhat.com/errata/RHSA-2022:7184

Comment 12 errata-xmlrpc 2022-10-25 15:21:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7190 https://access.redhat.com/errata/RHSA-2022:7190

Comment 13 Product Security DevOps Team 2022-12-02 14:35:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-42929