Security update for MozillaFirefox
Announcement ID: | SUSE-SU-2021:3451-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 20 vulnerabilities can now be installed.
Description:
This update for MozillaFirefox fixes the following issues:
This update contains the Firefox Extended Support Release 91.2.0 ESR.
Release 91.2.0 ESR:
- Fixed: Various stability, functionality, and security fixes
MFSA 2021-45 (bsc#1191332):
- CVE-2021-38496: Use-after-free in MessageTask
- CVE-2021-38497: Validation message could have been overlaid on another origin
- CVE-2021-38498: Use-after-free of nsLanguageAtomService object
- CVE-2021-32810: Fixed Data race in crossbeam-deque
- CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
-
CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2
-
Fixed crash in FIPS mode (bsc#1190710)
Release 91.1.0 ESR:
- Fixed: Various stability, functionality, and security fixes
MFSA 2021-40 (bsc#1190269, bsc#1190274):
- CVE-2021-38492: Navigating to
mk:
URL scheme could load Internet Explorer - CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1
Release 91.0.1esr ESR:
- Fixed: Fixed an issue causing buttons on the tab bar to be resized when loading certain websites (bug 1704404)
- Fixed: Fixed an issue which caused tabs from private windows to be visible in non-private windows when viewing switch-to- tab results in the address bar panel (bug 1720369)
- Fixed: Various stability fixes
- Fixed: Security fix MFSA 2021-37 (bsc#1189547)
- CVE-2021-29991 (bmo#1724896) Header Splitting possible with HTTP/3 Responses
Firefox Extended Support Release 91.0 ESR
-
New: Some of the highlights of the new Extended Support Release are:
-
A number of user interface changes. For more information, see the Firefox 89 release notes.
- Firefox now supports logging into Microsoft, work, and school accounts using Windows single sign-on. Learn more
- On Windows, updates can now be applied in the background while Firefox is not running.
- Firefox for Windows now offers a new page about:third-party to help identify compatibility issues caused by third-party applications
- Version 2 of Firefox's SmartBlock feature further improves private browsing. Third party Facebook scripts are blocked to prevent you from being tracked, but are now automatically loaded "just in time" if you decide to "Log in with Facebook" on any website.
- Enhanced the privacy of the Firefox Browser's Private Browsing mode with Total Cookie Protection, which confines cookies to the site where they were created, preventing companis from using cookies to track your browsing across sites. This feature was originally launched in Firefox's ETP Strict mode.
- PDF forms now support JavaScript embedded in PDF files. Some PDF forms use JavaScript for validation and other interactive features.
- You'll encounter less website breakage in Private Browsing and Strict Enhanced Tracking Protection with SmartBlock, which provides stand-in scripts so that websites load properly.
- Improved Print functionality with a cleaner design and better integration with your computer's printer settings.
- Firefox now protects you from supercookies, a type of tracker that can stay hidden in your browser and track you online, even after you clear cookies. By isolating supercookies, Firefox prevents them from tracking your web browsing from one site to the next.
- Firefox now remembers your preferred location for saved bookmarks, displays the bookmarks toolbar by default on new tabs, and gives you easy access to all of your bookmarks via a toolbar folder.
- Native support for macOS devices built with Apple Silicon CPUs brings dramatic performance improvements over the non- native build that was shipped in Firefox 83: Firefox launches over 2.5 times faster and web apps are now twice as responsive (per the SpeedoMeter 2.0 test). If you are on a new Apple device, follow these steps to upgrade to the latest Firefox.
- Pinch zooming will now be supported for our users with Windows touchscreen devices and touchpads on Mac devices. Firefox users may now use pinch to zoom on touch-capable devices to zoom in and out of webpages.
- We’ve improved functionality and design for a number of
Firefox search features:
- Selecting a search engine at the bottom of the search panel now enters search mode for that engine, allowing you to see suggestions (if available) for your search terms. The old behavior (immediately performing a search) is available with a shift-click.
- When Firefox autocompletes the URL of one of your search engines, you can now search with that engine directly in the address bar by selecting the shortcut in the address bar results.
- We’ve added buttons at the bottom of the search panel to allow you to search your bookmarks, open tabs, and history.
- Firefox supports AcroForm, which will allow you to fill in, print, and save supported PDF forms and the PDF viewer also has a new fresh look.
- For our users in the US and Canada, Firefox can now save, manage, and auto-fill credit card information for you, making shopping on Firefox ever more convenient.
- In addition to our default, dark and light themes, with this release, Firefox introduces the Alpenglow theme: a colorful appearance for buttons, menus, and windows. You can update your Firefox themes under settings or preferences.
- Changed: Firefox no longer supports Adobe Flash. There is no setting available to re-enable Flash support.
- Enterprise: Various bug fixes and new policies have been implemented in the latest version of Firefox. See more details in the Firefox for Enterprise 91 Release Notes.
MFSA 2021-33 (bsc#1188891):
- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
- CVE-2021-29990: Memory safety bugs fixed in Firefox 91
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Desktop Applications Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3451=1
-
Desktop Applications Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3451=1
Package List:
-
Desktop Applications Module 15-SP2 (aarch64 ppc64le s390x x86_64)
- MozillaFirefox-translations-other-91.2.0-8.54.1
- MozillaFirefox-branding-SLE-91-9.5.1
- MozillaFirefox-translations-common-91.2.0-8.54.1
- MozillaFirefox-devel-91.2.0-8.54.1
- MozillaFirefox-91.2.0-8.54.1
- MozillaFirefox-debuginfo-91.2.0-8.54.1
- MozillaFirefox-debugsource-91.2.0-8.54.1
-
Desktop Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- MozillaFirefox-branding-SLE-91-9.5.1
- MozillaFirefox-translations-common-91.2.0-8.54.1
- MozillaFirefox-translations-other-91.2.0-8.54.1
- MozillaFirefox-91.2.0-8.54.1
- MozillaFirefox-debuginfo-91.2.0-8.54.1
- MozillaFirefox-debugsource-91.2.0-8.54.1
-
Desktop Applications Module 15-SP3 (aarch64 ppc64le x86_64)
- MozillaFirefox-devel-91.2.0-8.54.1
References:
- https://www.suse.com/security/cve/CVE-2021-29980.html
- https://www.suse.com/security/cve/CVE-2021-29981.html
- https://www.suse.com/security/cve/CVE-2021-29982.html
- https://www.suse.com/security/cve/CVE-2021-29983.html
- https://www.suse.com/security/cve/CVE-2021-29984.html
- https://www.suse.com/security/cve/CVE-2021-29985.html
- https://www.suse.com/security/cve/CVE-2021-29986.html
- https://www.suse.com/security/cve/CVE-2021-29987.html
- https://www.suse.com/security/cve/CVE-2021-29988.html
- https://www.suse.com/security/cve/CVE-2021-29989.html
- https://www.suse.com/security/cve/CVE-2021-29990.html
- https://www.suse.com/security/cve/CVE-2021-29991.html
- https://www.suse.com/security/cve/CVE-2021-32810.html
- https://www.suse.com/security/cve/CVE-2021-38492.html
- https://www.suse.com/security/cve/CVE-2021-38495.html
- https://www.suse.com/security/cve/CVE-2021-38496.html
- https://www.suse.com/security/cve/CVE-2021-38497.html
- https://www.suse.com/security/cve/CVE-2021-38498.html
- https://www.suse.com/security/cve/CVE-2021-38500.html
- https://www.suse.com/security/cve/CVE-2021-38501.html
- https://bugzilla.suse.com/show_bug.cgi?id=1188891
- https://bugzilla.suse.com/show_bug.cgi?id=1189547
- https://bugzilla.suse.com/show_bug.cgi?id=1190269
- https://bugzilla.suse.com/show_bug.cgi?id=1190274
- https://bugzilla.suse.com/show_bug.cgi?id=1190710
- https://bugzilla.suse.com/show_bug.cgi?id=1191332