openSUSE: 2021:0621-1 important: MozillaFirefox | LinuxSecurity.com

   openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0621-1
Rating:             important
References:         #1184960 
Cross-References:   CVE-2021-23961 CVE-2021-23994 CVE-2021-23995
                    CVE-2021-23998 CVE-2021-23999 CVE-2021-24002
                    CVE-2021-29945 CVE-2021-29946
CVSS scores:
                    CVE-2021-23961 (NVD) : 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
                    CVE-2021-23961 (SUSE): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
                    CVE-2021-23994 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23995 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23998 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-23999 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-24002 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-29945 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-29946 (SUSE): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:

   This update for MozillaFirefox fixes the following issues:

   - Firefox was updated to 78.10.0 ESR (bsc#1184960)
     * CVE-2021-23994: Out of bound write due to lazy initialization
     * CVE-2021-23995: Use-after-free in Responsive Design Mode
     * CVE-2021-23998: Secure Lock icon could have been spoofed
     * CVE-2021-23961: More internal network hosts could have been probed by
       a malicious webpage
     * CVE-2021-23999: Blob URLs may have been granted additional privileges
     * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using
       an encoded URL
     * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could
       lead to null-reads
     * CVE-2021-29946: Port blocking could be bypassed

   This update was imported from the SUSE:SLE-15-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-621=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      MozillaFirefox-78.10.0-lp152.2.55.1
      MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1
      MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1
      MozillaFirefox-debuginfo-78.10.0-lp152.2.55.1
      MozillaFirefox-debugsource-78.10.0-lp152.2.55.1
      MozillaFirefox-devel-78.10.0-lp152.2.55.1
      MozillaFirefox-translations-common-78.10.0-lp152.2.55.1
      MozillaFirefox-translations-other-78.10.0-lp152.2.55.1


References:

   https://www.suse.com/security/cve/CVE-2021-23961.html
   https://www.suse.com/security/cve/CVE-2021-23994.html
   https://www.suse.com/security/cve/CVE-2021-23995.html
   https://www.suse.com/security/cve/CVE-2021-23998.html
   https://www.suse.com/security/cve/CVE-2021-23999.html
   https://www.suse.com/security/cve/CVE-2021-24002.html
   https://www.suse.com/security/cve/CVE-2021-29945.html
   https://www.suse.com/security/cve/CVE-2021-29946.html
   https://bugzilla.suse.com/1184960

openSUSE: 2021:0621-1 important: MozillaFirefox

April 26, 2021
An update that fixes 8 vulnerabilities is now available

Description

This update for MozillaFirefox fixes the following issues: - Firefox was updated to 78.10.0 ESR (bsc#1184960) * CVE-2021-23994: Out of bound write due to lazy initialization * CVE-2021-23995: Use-after-free in Responsive Design Mode * CVE-2021-23998: Secure Lock icon could have been spoofed * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage * CVE-2021-23999: Blob URLs may have been granted additional privileges * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads * CVE-2021-29946: Port blocking could be bypassed This update was imported from the SUSE:SLE-15-SP2:Update update project.

 

Patch

To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-621=1

Package List

- openSUSE Leap 15.2 (x86_64): MozillaFirefox-78.10.0-lp152.2.55.1 MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 MozillaFirefox-debuginfo-78.10.0-lp152.2.55.1 MozillaFirefox-debugsource-78.10.0-lp152.2.55.1 MozillaFirefox-devel-78.10.0-lp152.2.55.1 MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 MozillaFirefox-translations-other-78.10.0-lp152.2.55.1

References

https://www.suse.com/security/cve/CVE-2021-23961.html https://www.suse.com/security/cve/CVE-2021-23994.html https://www.suse.com/security/cve/CVE-2021-23995.html https://www.suse.com/security/cve/CVE-2021-23998.html https://www.suse.com/security/cve/CVE-2021-23999.html https://www.suse.com/security/cve/CVE-2021-24002.html https://www.suse.com/security/cve/CVE-2021-29945.html https://www.suse.com/security/cve/CVE-2021-29946.html https://bugzilla.suse.com/1184960

Severity
Announcement ID: openSUSE-SU-2021:0621-1
Rating: important
Affected Products: openSUSE Leap 15.2 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.