firefox-esr is vulnerable to timing attack. An attacker allows to send a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals.
bugzilla.mozilla.org/show_bug.cgi?id=1730434
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.15/community.yaml
secdb.alpinelinux.org/v3.16/community.yaml
www.mozilla.org/security/advisories/mfsa2022-20/
www.mozilla.org/security/advisories/mfsa2022-21/
www.mozilla.org/security/advisories/mfsa2022-22/