[ALSA-2022:8580] Important: firefox security update
Type:
security
Severity:
important
Release date:
2022-11-22
Description:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 firefox-102.5.0-1.el9_1.alma.aarch64.rpm 506a0ffe51f1e6d31a6a3aff06237aaa6f68d15c08c4f353cc18b611661d4bff
ppc64le firefox-102.5.0-1.el9_1.alma.ppc64le.rpm a70d0c5bb62ed9a597d00a80b520563774f43259fc228249705a7b165b6d2606
s390x firefox-102.5.0-1.el9_1.alma.s390x.rpm 8d4f855507485ea53f1d24d21c0a07c02a8a3021915801a1dcb4662711dfeef4
x86_64 firefox-102.5.0-1.el9_1.alma.x86_64.rpm 51a804a36814dd68558d0eb6b20c87128cf747e6954928f4e41f2c82ee01ab2f
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.