openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2022:1127-1
Rating:             important
References:         #1197698 #1197903 
Cross-References:   CVE-2022-1097 CVE-2022-1196 CVE-2022-24713
                    CVE-2022-28281 CVE-2022-28282 CVE-2022-28285
                    CVE-2022-28286 CVE-2022-28289
CVSS scores:
                    CVE-2022-24713 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-24713 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    openSUSE Leap 15.3
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:

   This update for MozillaFirefox fixes the following issues:

   Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

   MFSA 2022-14 (bsc#1197903)

   * CVE-2022-1097: Fixed memory safety violations that could occur when
     PKCS#11 tokens are removed while in use
   * CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN
     Extensions
   * CVE-2022-1196: Fixed a use-after-free after VR Process destruction
   * CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
   * CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
   * CVE-2022-28286: Fixed that iframe contents could be rendered outside the
     border
   * CVE-2022-24713: Fixed a denial of service via complex regular expressions
   * CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR
     91.8

   The following non-security bugs were fixed:

   - Adjust rust dependency for SP3 and later. TW uses always the newest
     version of rust, but we don't, so we can't use the rust+cargo notation,
     which would need both < and >= requirements. (bsc#1197698)


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-1127=1

   - openSUSE Leap 15.3:

      zypper in -t patch openSUSE-SLE-15.3-2022-1127=1



Package List:

   - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

      MozillaFirefox-91.8.0-150200.152.26.1
      MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1
      MozillaFirefox-debuginfo-91.8.0-150200.152.26.1
      MozillaFirefox-debugsource-91.8.0-150200.152.26.1
      MozillaFirefox-devel-91.8.0-150200.152.26.1
      MozillaFirefox-translations-common-91.8.0-150200.152.26.1
      MozillaFirefox-translations-other-91.8.0-150200.152.26.1

   - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):

      MozillaFirefox-91.8.0-150200.152.26.1
      MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1
      MozillaFirefox-debuginfo-91.8.0-150200.152.26.1
      MozillaFirefox-debugsource-91.8.0-150200.152.26.1
      MozillaFirefox-devel-91.8.0-150200.152.26.1
      MozillaFirefox-translations-common-91.8.0-150200.152.26.1
      MozillaFirefox-translations-other-91.8.0-150200.152.26.1


References:

   https://www.suse.com/security/cve/CVE-2022-1097.html
   https://www.suse.com/security/cve/CVE-2022-1196.html
   https://www.suse.com/security/cve/CVE-2022-24713.html
   https://www.suse.com/security/cve/CVE-2022-28281.html
   https://www.suse.com/security/cve/CVE-2022-28282.html
   https://www.suse.com/security/cve/CVE-2022-28285.html
   https://www.suse.com/security/cve/CVE-2022-28286.html
   https://www.suse.com/security/cve/CVE-2022-28289.html
   https://bugzilla.suse.com/1197698
   https://bugzilla.suse.com/1197903