Content-Type: |
text/plain; charset="utf-8" |
Date: |
Thu, 25 Aug 2022 16:27:02 -0000 |
Reply-To: |
|
Subject: |
|
MIME-Version: |
1.0 |
Message-ID: |
<20220825162702.4878.26689@0acbe050e934> |
Content-Transfer-Encoding: |
7bit |
Sender: |
|
From: |
|
Parts/Attachments: |
|
|
Synopsis: Important: firefox security update
Advisory ID: SLSA-2022:6179-1
Issue Date: 2022-08-25
CVE Numbers: CVE-2022-38472
CVE-2022-38473
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
--
This update upgrades Firefox to version 91.13.0 ESR.
Security Fix(es):
* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472)
* Mozilla: Cross-origin XSLT Documents would have inherited the parent's
permissions (CVE-2022-38473)
* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2
(CVE-2022-38477)
* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and
Firefox ESR 91.13 (CVE-2022-38478)
* Mozilla: Data race and potential use-after-free in PK11_ChangePW
(CVE-2022-38476)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--
SL7
x86_64
firefox-91.13.0-1.el7_9.x86_64.rpm
firefox-debuginfo-91.13.0-1.el7_9.x86_64.rpm
firefox-91.13.0-1.el7_9.i686.rpm
- Scientific Linux Development Team
|
|
|