-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0938
MFSA 2022-09 Security Vulnerabilities fixed in Firefox 97.0.2, Firefox ESR
           91.6.1, Firefox for Android 97.3.0, and Focus 97.3.0
                               7 March 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Firefox
                   Firefox ESR
                   Focus
                   Thunderbird
Publisher:         Mozilla
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
                   Android
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-26486 CVE-2022-26485 

Original Bulletin: 
   https://www.mozilla.org/en-US/security/advisories/mfsa2022-09/

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

Mozilla Foundation Security Advisory 2022-09

Security Vulnerabilities fixed in Firefox 97.0.2, Firefox ESR 91.6.1, Firefox
for Android 97.3.0, and Focus 97.3.0

Announced: March  5, 2022
Impact:    high
Products:  Firefox, Firefox ESR, Firefox for Android, Focus, Thunderbird
Fixed in:  Firefox 97.0.2
Firefox ESR 91.6.1
Firefox for Android 97.3
Focus 97.3
Thunderbird 91.6.2

# CVE-2022-26485: Use-after-free in XSLT parameter processing

Reporter: Wang Gang, Liu Jialei, Du Sihang, Huang Yi & Yang Kang of 360 ATA
Impact:   critical

Description

Removing an XSLT parameter during processing could have lead to an exploitable
use-after-free. We have had reports of attacks in the wild abusing this flaw.

References

  o Bug 1758062

# CVE-2022-26486: Use-after-free in WebGPU IPC Framework

Reporter: Wang Gang, Liu Jialei, Du Sihang, Huang Yi & Yang Kang of 360 ATA
Impact:   critical

Description

An unexpected message in the WebGPU IPC framework could lead to a
use-after-free and exploitable sandbox escape. We have had reports of attacks
in the wild abusing this flaw.

References

  o Bug 1758070

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=KRzG
-----END PGP SIGNATURE-----