Rocky Linux: RLSA-2021:3755 firefox security update | LinuxSecurit...
\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:3755', 'synopsis': 'Important: firefox security update', 'severity': 'Important', 'topic': 'An update for firefox is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\nThis update upgrades Firefox to version 91.2.0 ESR.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1990342', '2011097', '2011098', '2011099', '2011100', '2011101'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json:::CVE-2021-32810', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38496.json:::CVE-2021-38496', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json:::CVE-2021-38497', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json:::CVE-2021-38498', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38500.json:::CVE-2021-38500', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json:::CVE-2021-38501'], 'references': [], 'publishedAt': '2021-10-12T00:32:57.671088Z', 'rpms': ['firefox-91.2.0-4.el8_4.aarch64.rpm', 'firefox-91.2.0-4.el8_4.src.rpm', 'firefox-91.2.0-4.el8_4.x86_64.rpm', 'firefox-debuginfo-91.2.0-4.el8_4.aarch64.rpm', 'firefox-debuginfo-91.2.0-4.el8_4.x86_64.rpm', 'firefox-debugsource-91.2.0-4.el8_4.aarch64.rpm', 'firefox-debugsource-91.2.0-4.el8_4.x86_64.rpm']}\

Rocky Linux: RLSA-2021:3755 firefox security update

September 2, 2022
An update for firefox is now available for Rocky Linux 8

Summary

An update for firefox is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.2.0 ESR. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

firefox-91.2.0-4.el8_4.aarch64.rpm
firefox-91.2.0-4.el8_4.src.rpm
firefox-91.2.0-4.el8_4.x86_64.rpm
firefox-debuginfo-91.2.0-4.el8_4.aarch64.rpm
firefox-debuginfo-91.2.0-4.el8_4.x86_64.rpm
firefox-debugsource-91.2.0-4.el8_4.aarch64.rpm
firefox-debugsource-91.2.0-4.el8_4.x86_64.rpm

References

CVES

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38496.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38500.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json

Severity
Name: RLSA-2021:3755
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1990342

https://bugzilla.redhat.com/show_bug.cgi?id=2011097

https://bugzilla.redhat.com/show_bug.cgi?id=2011098

https://bugzilla.redhat.com/show_bug.cgi?id=2011099

https://bugzilla.redhat.com/show_bug.cgi?id=2011100

https://bugzilla.redhat.com/show_bug.cgi?id=2011101

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.