Security update for MozillaFirefox
Announcement ID: | SUSE-SU-2022:14906-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):
- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):
- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-MozillaFirefox-14906=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-MozillaFirefox-14906=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (x86_64)
- MozillaFirefox-translations-common-91.7.0-78.167.1
- MozillaFirefox-91.7.0-78.167.1
- MozillaFirefox-translations-other-91.7.0-78.167.1
-
SUSE Linux Enterprise Server 11 SP4 (x86_64)
- MozillaFirefox-translations-common-91.7.0-78.167.1
- MozillaFirefox-91.7.0-78.167.1
- MozillaFirefox-translations-other-91.7.0-78.167.1
References:
- https://www.suse.com/security/cve/CVE-2022-26381.html
- https://www.suse.com/security/cve/CVE-2022-26383.html
- https://www.suse.com/security/cve/CVE-2022-26384.html
- https://www.suse.com/security/cve/CVE-2022-26386.html
- https://www.suse.com/security/cve/CVE-2022-26387.html
- https://www.suse.com/security/cve/CVE-2022-26485.html
- https://www.suse.com/security/cve/CVE-2022-26486.html
- https://bugzilla.suse.com/show_bug.cgi?id=1196809
- https://bugzilla.suse.com/show_bug.cgi?id=1196900