[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:2279-1 -- SLES MozillaFirefox

ID: oval:org.secpod.oval:def:89046747Date: (C)2022-07-07   (M)2023-11-19
Class: PATCHFamily: unix




This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 91.11.0 ESR : - CVE-2022-2200: Undesired attributes could be set as part of prototype pollution - CVE-2022-31744: CSP bypass enabling stylesheet injection - CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI - CVE-2022-34470: Use-after-free in nsSHistory - CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked - CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt - CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content - CVE-2022-34481: Potential integer overflow in ReplaceElementsAt - CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11

Platform:
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Server 15 SP1
Product:
MozillaFirefox
Reference:
SUSE-SU-2022:2279-1
CVE-2022-2200
CVE-2022-31744
CVE-2022-34468
CVE-2022-34470
CVE-2022-34472
CVE-2022-34478
CVE-2022-34479
CVE-2022-34481
CVE-2022-34484
CVE    9
CVE-2022-2200
CVE-2022-34470
CVE-2022-34481
CVE-2022-34484
...
CPE    3
cpe:/o:suse:suse_linux_enterprise_server:15:sp1
cpe:/o:suse:suse_linux_enterprise_server:15
cpe:/a:mozilla:MozillaFirefox

© SecPod Technologies