openSUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:0821-1 Rating: important References: #1196900 Cross-References: CVE-2022-26381 CVE-2022-26383 CVE-2022-26384 CVE-2022-26386 CVE-2022-26387 Affected Products: openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.7.0 ESR (bsc#1196900): - CVE-2022-26383: Browser window spoof using fullscreen mode - CVE-2022-26384: iframe allow-scripts sandbox bypass - CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures - CVE-2022-26381: Use-after-free in text reflows - CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-821=1 - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-821=1 Package List: - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): MozillaFirefox-91.7.0-152.22.1 MozillaFirefox-branding-upstream-91.7.0-152.22.1 MozillaFirefox-debuginfo-91.7.0-152.22.1 MozillaFirefox-debugsource-91.7.0-152.22.1 MozillaFirefox-devel-91.7.0-152.22.1 MozillaFirefox-translations-common-91.7.0-152.22.1 MozillaFirefox-translations-other-91.7.0-152.22.1 - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): MozillaFirefox-91.7.0-152.22.1 MozillaFirefox-branding-upstream-91.7.0-152.22.1 MozillaFirefox-debuginfo-91.7.0-152.22.1 MozillaFirefox-debugsource-91.7.0-152.22.1 MozillaFirefox-devel-91.7.0-152.22.1 MozillaFirefox-translations-common-91.7.0-152.22.1 MozillaFirefox-translations-other-91.7.0-152.22.1 References: https://www.suse.com/security/cve/CVE-2022-26381.html https://www.suse.com/security/cve/CVE-2022-26383.html https://www.suse.com/security/cve/CVE-2022-26384.html https://www.suse.com/security/cve/CVE-2022-26386.html https://www.suse.com/security/cve/CVE-2022-26387.html https://bugzilla.suse.com/1196900