Synopsis: Important: firefox security update
Advisory ID: SLSA-2022:8552-1
Issue Date: 2022-11-22
CVE Numbers: CVE-2022-45403
CVE-2022-45404
CVE-2022-45405
CVE-2022-45406
CVE-2022-45408
CVE-2022-45409
CVE-2022-45410
CVE-2022-45411
CVE-2022-45412
CVE-2022-45416
CVE-2022-45418
CVE-2022-45420
CVE-2022-45421
—
This update upgrades Firefox to version 102.5.0 ESR.
Security Fix(es):
* Mozilla: Service Workers might have learned size of cross-origin media
files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
(CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie
policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override
headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers
(CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI
(CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe
(CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
—
SL7
x86_64
firefox-102.5.0-1.el7_9.x86_64.rpm
firefox-debuginfo-102.5.0-1.el7_9.x86_64.rpm
firefox-102.5.0-1.el7_9.i686.rpm
firefox-debuginfo-102.5.0-1.el7_9.i686.rpm
– Scientific Linux Development Team