SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:14896-1
Rating:             important
References:         #1195230 #1195682 
Cross-References:   CVE-2022-22753 CVE-2022-22754 CVE-2022-22756
                    CVE-2022-22759 CVE-2022-22760 CVE-2022-22761
                    CVE-2022-22763 CVE-2022-22764
Affected Products:
                    SUSE Linux Enterprise Debuginfo 11-SP4
                    SUSE Linux Enterprise Server 11-SP4-LTSS
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:

   This update for MozillaFirefox fixes the following issues:

   Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

   - CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via
     Maintenance Service
   - CVE-2022-22754: Extensions could have bypassed permission confirmation
     during update
   - CVE-2022-22756: Drag and dropping an image could have resulted in the
     dropped object being an executable
   - CVE-2022-22759: Sandboxed iframes could have executed script if the
     parent appended elements
   - CVE-2022-22760: Cross-Origin responses could be distinguished between
     script and non-script content-types
   - CVE-2022-22761: frame-ancestors Content Security Policy directive was
     not enforced for framed extension pages
   - CVE-2022-22763: Script Execution during invalid object state
   - CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR
     91.6


   Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

   - Fixed an issue that allowed unexpected data to be submitted in some of
     our search telemetry


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-MozillaFirefox-14896=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-MozillaFirefox-14896=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64):

      MozillaFirefox-91.6.0-78.162.2
      MozillaFirefox-translations-common-91.6.0-78.162.2
      MozillaFirefox-translations-other-91.6.0-78.162.2

   - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64):

      MozillaFirefox-debuginfo-91.6.0-78.162.2


References:

   https://www.suse.com/security/cve/CVE-2022-22753.html
   https://www.suse.com/security/cve/CVE-2022-22754.html
   https://www.suse.com/security/cve/CVE-2022-22756.html
   https://www.suse.com/security/cve/CVE-2022-22759.html
   https://www.suse.com/security/cve/CVE-2022-22760.html
   https://www.suse.com/security/cve/CVE-2022-22761.html
   https://www.suse.com/security/cve/CVE-2022-22763.html
   https://www.suse.com/security/cve/CVE-2022-22764.html
   https://bugzilla.suse.com/1195230
   https://bugzilla.suse.com/1195682

SUSE: 2022:14896-1 important: MozillaFirefox

February 24, 2022
An update that fixes 8 vulnerabilities is now available

Summary

This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682) - CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service - CVE-2022-22754: Extensions could have bypassed permission confirmation during update - CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable - CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements - CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types - CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages - CVE-2022-22763: Script Execution during invalid object state - CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 Firefox Extended Support Release 91.5.1 ESR (bsc#1195230) - Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-MozillaFirefox-14896=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-MozillaFirefox-14896=1 Package List: - SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64): MozillaFirefox-91.6.0-78.162.2 MozillaFirefox-translations-common-91.6.0-78.162.2 MozillaFirefox-translations-other-91.6.0-78.162.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): MozillaFirefox-debuginfo-91.6.0-78.162.2

References

#1195230 #1195682

Cross- CVE-2022-22753 CVE-2022-22754 CVE-2022-22756

CVE-2022-22759 CVE-2022-22760 CVE-2022-22761

CVE-2022-22763 CVE-2022-22764

Affected Products:

SUSE Linux Enterprise Debuginfo 11-SP4

SUSE Linux Enterprise Server 11-SP4-LTSS

https://www.suse.com/security/cve/CVE-2022-22753.html

https://www.suse.com/security/cve/CVE-2022-22754.html

https://www.suse.com/security/cve/CVE-2022-22756.html

https://www.suse.com/security/cve/CVE-2022-22759.html

https://www.suse.com/security/cve/CVE-2022-22760.html

https://www.suse.com/security/cve/CVE-2022-22761.html

https://www.suse.com/security/cve/CVE-2022-22763.html

https://www.suse.com/security/cve/CVE-2022-22764.html

https://bugzilla.suse.com/1195230

https://bugzilla.suse.com/1195682

Severity
Announcement ID: SUSE-SU-2022:14896-1
Rating: important

Related News