Rocky Linux: RLSA-2022:4872 firefox security update | LinuxSecurit...

Advisories

\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2022:4872', 'synopsis': 'Important: firefox security update', 'severity': 'Important', 'topic': 'An update for firefox is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\nThis update upgrades Firefox to version 91.10.0 ESR.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['2092018', '2092019', '2092021', '2092023', '2092024', '2092025', '2092026'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31736.json:::CVE-2022-31736', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31737.json:::CVE-2022-31737', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31738.json:::CVE-2022-31738', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31740.json:::CVE-2022-31740', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31741.json:::CVE-2022-31741', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31742.json:::CVE-2022-31742', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31747.json:::CVE-2022-31747'], 'references': [], 'publishedAt': '2022-07-07T19:58:47.232792Z', 'rpms': ['firefox-91.10.0-1.el8_6.aarch64.rpm', 'firefox-91.10.0-1.el8_6.src.rpm', 'firefox-91.10.0-1.el8_6.x86_64.rpm', 'firefox-debuginfo-91.10.0-1.el8_6.aarch64.rpm', 'firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm', 'firefox-debugsource-91.10.0-1.el8_6.aarch64.rpm', 'firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm', 'thunderbird-91.10.0-1.el8_6.aarch64.rpm', 'thunderbird-91.10.0-1.el8_6.src.rpm', 'thunderbird-91.10.0-1.el8_6.x86_64.rpm', 'thunderbird-debuginfo-91.10.0-1.el8_6.aarch64.rpm', 'thunderbird-debuginfo-91.10.0-1.el8_6.x86_64.rpm', 'thunderbird-debugsource-91.10.0-1.el8_6.aarch64.rpm', 'thunderbird-debugsource-91.10.0-1.el8_6.x86_64.rpm']}\

Rocky Linux: RLSA-2022:4872 firefox security update

September 2, 2022
An update for firefox is now available for Rocky Linux 8

Summary

An update for firefox is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

firefox-91.10.0-1.el8_6.aarch64.rpm
firefox-91.10.0-1.el8_6.src.rpm
firefox-91.10.0-1.el8_6.x86_64.rpm
firefox-debuginfo-91.10.0-1.el8_6.aarch64.rpm
firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm
firefox-debugsource-91.10.0-1.el8_6.aarch64.rpm
firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm
thunderbird-91.10.0-1.el8_6.aarch64.rpm
thunderbird-91.10.0-1.el8_6.src.rpm
thunderbird-91.10.0-1.el8_6.x86_64.rpm
thunderbird-debuginfo-91.10.0-1.el8_6.aarch64.rpm
thunderbird-debuginfo-91.10.0-1.el8_6.x86_64.rpm
thunderbird-debugsource-91.10.0-1.el8_6.aarch64.rpm
thunderbird-debugsource-91.10.0-1.el8_6.x86_64.rpm

References

Severity
Name: RLSA-2022:4872
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2092018

https://bugzilla.redhat.com/show_bug.cgi?id=2092019

https://bugzilla.redhat.com/show_bug.cgi?id=2092021

https://bugzilla.redhat.com/show_bug.cgi?id=2092023

https://bugzilla.redhat.com/show_bug.cgi?id=2092024

https://bugzilla.redhat.com/show_bug.cgi?id=2092025

https://bugzilla.redhat.com/show_bug.cgi?id=2092026

CVES

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31736.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31737.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31738.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31740.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31741.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31742.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31747.json

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.