Security update for MozillaFirefox
| Announcement ID: | SUSE-SU-2022:14906-1 | 
|---|---|
| Rating: | important | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves seven vulnerabilities can now be installed.
Description:
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):
- CVE-2022-26383: Browser window spoof using fullscreen mode
 - CVE-2022-26384: iframe allow-scripts sandbox bypass
 - CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
 - CVE-2022-26381: Use-after-free in text reflows
 - CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
 
Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):
- CVE-2022-26485: Use-after-free in XSLT parameter processing
 - CVE-2022-26486: Use-after-free in WebGPU IPC Framework
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
                
                    
                        
zypper in -t patch slessp4-MozillaFirefox-14906=1 - 
                SUSE Linux Enterprise Server 11 SP4
                
                    
                        
zypper in -t patch slessp4-MozillaFirefox-14906=1 
Package List:
- 
                    SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (x86_64)
                    
- MozillaFirefox-translations-common-91.7.0-78.167.1
 - MozillaFirefox-91.7.0-78.167.1
 - MozillaFirefox-translations-other-91.7.0-78.167.1
 
 - 
                    SUSE Linux Enterprise Server 11 SP4 (x86_64)
                    
- MozillaFirefox-translations-common-91.7.0-78.167.1
 - MozillaFirefox-91.7.0-78.167.1
 - MozillaFirefox-translations-other-91.7.0-78.167.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2022-26381.html
 - https://www.suse.com/security/cve/CVE-2022-26383.html
 - https://www.suse.com/security/cve/CVE-2022-26384.html
 - https://www.suse.com/security/cve/CVE-2022-26386.html
 - https://www.suse.com/security/cve/CVE-2022-26387.html
 - https://www.suse.com/security/cve/CVE-2022-26485.html
 - https://www.suse.com/security/cve/CVE-2022-26486.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1196809
 - https://bugzilla.suse.com/show_bug.cgi?id=1196900