Synopsis:          Important: firefox security update
Advisory ID:       SLSA-2021:5014-1
Issue Date:        2021-12-08
CVE Numbers:       CVE-2021-43536
                   CVE-2021-43537
                   CVE-2021-43538
                   CVE-2021-43539
                   CVE-2021-43541
                   CVE-2021-43542
                   CVE-2021-43543
                   CVE-2021-43545
                   CVE-2021-43546
--

This update upgrades Firefox to version 91.4.0 ESR.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4

* Mozilla: URL leakage when navigating while executing asynchronous
function (CVE-2021-43536)

* Mozilla: Heap buffer overflow when using structured clone
(CVE-2021-43537)

* Mozilla: Missing fullscreen and pointer lock notification when
requesting  both (CVE-2021-43538)

* Mozilla: GC rooting failure when calling wasm instance methods
(CVE-2021-43539)

* Mozilla: External protocol handler parameters were unescaped
(CVE-2021-43541)

* Mozilla: XMLHttpRequest error codes could have leaked the existence of
an  external protocol handler (CVE-2021-43542)

* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543)

* Mozilla: Denial of Service when using the Location API in a loop
(CVE-2021-43545)

* Mozilla: Cursor spoofing could overlay user interface when native cursor
is zoomed (CVE-2021-43546)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

SL7
  x86_64
    firefox-91.4.0-1.el7_9.x86_64.rpm
    firefox-debuginfo-91.4.0-1.el7_9.x86_64.rpm
    firefox-91.4.0-1.el7_9.i686.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2021-5014-1 Important: firefox on SL7.x x86_64

This update upgrades Firefox to version 91.4.0 ESR

Summary

Important: firefox security update



Security Fixes

* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
* Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536)
* Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537)
* Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538)
* Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539)
* Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541)
* Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542)
* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543)
* Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545)
* Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE
SL7 x86_64 firefox-91.4.0-1.el7_9.x86_64.rpm firefox-debuginfo-91.4.0-1.el7_9.x86_64.rpm firefox-91.4.0-1.el7_9.i686.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2021:5014-1
Issued Date: : 2021-12-08
CVE Numbers: CVE-2021-43536
CVE-2021-43537
CVE-2021-43538

Related News