openSUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:1127-1 Rating: important References: #1197698 #1197903 Cross-References: CVE-2022-1097 CVE-2022-1196 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28285 CVE-2022-28286 CVE-2022-28289 CVSS scores: CVE-2022-24713 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2022-24713 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.8.0 ESR (bsc#1197903): MFSA 2022-14 (bsc#1197903) * CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use * CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions * CVE-2022-1196: Fixed a use-after-free after VR Process destruction * CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument * CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen * CVE-2022-28286: Fixed that iframe contents could be rendered outside the border * CVE-2022-24713: Fixed a denial of service via complex regular expressions * CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 The following non-security bugs were fixed: - Adjust rust dependency for SP3 and later. TW uses always the newest version of rust, but we don't, so we can't use the rust+cargo notation, which would need both < and >= requirements. (bsc#1197698) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1127=1 - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1127=1 Package List: - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): MozillaFirefox-91.8.0-150200.152.26.1 MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1 MozillaFirefox-debuginfo-91.8.0-150200.152.26.1 MozillaFirefox-debugsource-91.8.0-150200.152.26.1 MozillaFirefox-devel-91.8.0-150200.152.26.1 MozillaFirefox-translations-common-91.8.0-150200.152.26.1 MozillaFirefox-translations-other-91.8.0-150200.152.26.1 - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): MozillaFirefox-91.8.0-150200.152.26.1 MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1 MozillaFirefox-debuginfo-91.8.0-150200.152.26.1 MozillaFirefox-debugsource-91.8.0-150200.152.26.1 MozillaFirefox-devel-91.8.0-150200.152.26.1 MozillaFirefox-translations-common-91.8.0-150200.152.26.1 MozillaFirefox-translations-other-91.8.0-150200.152.26.1 References: https://www.suse.com/security/cve/CVE-2022-1097.html https://www.suse.com/security/cve/CVE-2022-1196.html https://www.suse.com/security/cve/CVE-2022-24713.html https://www.suse.com/security/cve/CVE-2022-28281.html https://www.suse.com/security/cve/CVE-2022-28282.html https://www.suse.com/security/cve/CVE-2022-28285.html https://www.suse.com/security/cve/CVE-2022-28286.html https://www.suse.com/security/cve/CVE-2022-28289.html https://bugzilla.suse.com/1197698 https://bugzilla.suse.com/1197903