SUSE 5146 Published by

A MozillaFirefox security update has been released for openSUSE Leap 15.3 and 15.4.



openSUSE-SU-2022:1127-1: important: Security update for MozillaFirefox


openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2022:1127-1
Rating: important
References: #1197698 #1197903
Cross-References: CVE-2022-1097 CVE-2022-1196 CVE-2022-24713
CVE-2022-28281 CVE-2022-28282 CVE-2022-28285
CVE-2022-28286 CVE-2022-28289
CVSS scores:
CVE-2022-24713 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24713 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:

This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when
PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN
Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the
border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR
91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the newest
version of rust, but we don't, so we can't use the rust+cargo notation,
which would need both < and >= requirements. (bsc#1197698)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.4:

zypper in -t patch openSUSE-SLE-15.4-2022-1127=1

- openSUSE Leap 15.3:

zypper in -t patch openSUSE-SLE-15.3-2022-1127=1


Package List:

- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

MozillaFirefox-91.8.0-150200.152.26.1
MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1
MozillaFirefox-debuginfo-91.8.0-150200.152.26.1
MozillaFirefox-debugsource-91.8.0-150200.152.26.1
MozillaFirefox-devel-91.8.0-150200.152.26.1
MozillaFirefox-translations-common-91.8.0-150200.152.26.1
MozillaFirefox-translations-other-91.8.0-150200.152.26.1

- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):

MozillaFirefox-91.8.0-150200.152.26.1
MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1
MozillaFirefox-debuginfo-91.8.0-150200.152.26.1
MozillaFirefox-debugsource-91.8.0-150200.152.26.1
MozillaFirefox-devel-91.8.0-150200.152.26.1
MozillaFirefox-translations-common-91.8.0-150200.152.26.1
MozillaFirefox-translations-other-91.8.0-150200.152.26.1

References:

  https://www.suse.com/security/cve/CVE-2022-1097.html
  https://www.suse.com/security/cve/CVE-2022-1196.html
  https://www.suse.com/security/cve/CVE-2022-24713.html
  https://www.suse.com/security/cve/CVE-2022-28281.html
  https://www.suse.com/security/cve/CVE-2022-28282.html
  https://www.suse.com/security/cve/CVE-2022-28285.html
  https://www.suse.com/security/cve/CVE-2022-28286.html
  https://www.suse.com/security/cve/CVE-2022-28289.html
  https://bugzilla.suse.com/1197698
  https://bugzilla.suse.com/1197903