CVE-2022-26387

NameCVE-2022-26387
DescriptionWhen installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2942-1, DLA-2961-1, DSA-5097-1, DSA-5106-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid131.0-1fixed
firefox-esr (PTS)bullseye115.14.0esr-1~deb11u1fixed
bullseye (security)128.3.0esr-1~deb11u2fixed
bookworm115.14.0esr-1~deb12u1fixed
bookworm (security)128.3.0esr-1~deb12u1fixed
trixie115.15.0esr-1fixed
sid128.3.0esr-2fixed
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1fixed
bullseye (security)1:115.15.0-1~deb11u1fixed
bookworm1:115.12.0-1~deb12u1fixed
bookworm (security)1:115.15.0-1~deb12u1fixed
trixie1:128.2.0esr-1fixed
sid1:128.3.0esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)98.0-1
firefox-esrsourcestretch91.7.0esr-1~deb9u1DLA-2942-1
firefox-esrsourcebuster91.7.0esr-1~deb10u1DSA-5097-1
firefox-esrsourcebullseye91.7.0esr-1~deb11u1DSA-5097-1
firefox-esrsource(unstable)91.7.0esr-1
thunderbirdsourcestretch1:91.7.0-2~deb9u1DLA-2961-1
thunderbirdsourcebuster1:91.7.0-2~deb10u1DSA-5106-1
thunderbirdsourcebullseye1:91.7.0-2~deb11u1DSA-5106-1
thunderbirdsource(unstable)1:91.7.0-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2022-10/#CVE-2022-26387
https://www.mozilla.org/en-US/security/advisories/mfsa2022-11/#CVE-2022-26387
https://www.mozilla.org/en-US/security/advisories/mfsa2022-12/#CVE-2022-26387

Search for package or bug name: Reporting problems