|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2023:0112-1 (firefox)

From:  sle-security-updates@lists.suse.com
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2023:0112-1: important: Security update for MozillaFirefox
Date:  Fri, 20 Jan 2023 15:27:42 +0100
Message-ID:  <20230120142742.3DC64FD96@maintenance.suse.de>

SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2023:0112-1 Rating: important References: #1207119 Cross-References: CVE-2022-46871 CVE-2022-46877 CVE-2023-23598 CVE-2023-23601 CVE-2023-23602 CVE-2023-23603 CVE-2023-23605 CVSS scores: CVE-2022-46871 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2022-46877 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server for SAP 15-SP1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for MozillaFirefox fixes the following issues: - Updated to version 102.7.0 ESR (bsc#1207119): - CVE-2022-46871: Updated an out of date library (libusrsctp) which contained several vulnerabilities. - CVE-2023-23598: Fixed an arbitrary file read from GTK drag and drop on Linux. - CVE-2023-23601: Fixed a potential spoofing attack when dragging a URL from a cross-origin iframe into the same tab. - CVE-2023-23602: Fixed a mishandled security check, which caused the Content Security Policy header to be ignored for WebSockets in WebWorkers. - CVE-2022-46877: Fixed a fullscreen notification bypass which could be leveraged in spoofing attacks. - CVE-2023-23603: Fixed a Content Security Policy bypass via format directives. - CVE-2023-23605: Fixed several memory safety bugs. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-112=1 - SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-112=1 - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-112=1 - SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2023-112=1 - SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: - SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): MozillaFirefox-102.7.0-150000.150.71.1 MozillaFirefox-debuginfo-102.7.0-150000.150.71.1 MozillaFirefox-debugsource-102.7.0-150000.150.71.1 MozillaFirefox-devel-102.7.0-150000.150.71.1 MozillaFirefox-translations-common-102.7.0-150000.150.71.1 MozillaFirefox-translations-other-102.7.0-150000.150.71.1 - SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): MozillaFirefox-102.7.0-150000.150.71.1 MozillaFirefox-debuginfo-102.7.0-150000.150.71.1 MozillaFirefox-debugsource-102.7.0-150000.150.71.1 MozillaFirefox-devel-102.7.0-150000.150.71.1 MozillaFirefox-translations-common-102.7.0-150000.150.71.1 MozillaFirefox-translations-other-102.7.0-150000.150.71.1 - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): MozillaFirefox-102.7.0-150000.150.71.1 MozillaFirefox-debuginfo-102.7.0-150000.150.71.1 MozillaFirefox-debugsource-102.7.0-150000.150.71.1 MozillaFirefox-devel-102.7.0-150000.150.71.1 MozillaFirefox-translations-common-102.7.0-150000.150.71.1 MozillaFirefox-translations-other-102.7.0-150000.150.71.1 - SUSE Enterprise Storage 6 (aarch64 x86_64): MozillaFirefox-102.7.0-150000.150.71.1 MozillaFirefox-debuginfo-102.7.0-150000.150.71.1 MozillaFirefox-debugsource-102.7.0-150000.150.71.1 MozillaFirefox-devel-102.7.0-150000.150.71.1 MozillaFirefox-translations-common-102.7.0-150000.150.71.1 MozillaFirefox-translations-other-102.7.0-150000.150.71.1 - SUSE CaaS Platform 4.0 (x86_64): MozillaFirefox-102.7.0-150000.150.71.1 MozillaFirefox-debuginfo-102.7.0-150000.150.71.1 MozillaFirefox-debugsource-102.7.0-150000.150.71.1 MozillaFirefox-devel-102.7.0-150000.150.71.1 MozillaFirefox-translations-common-102.7.0-150000.150.71.1 MozillaFirefox-translations-other-102.7.0-150000.150.71.1 References: https://www.suse.com/security/cve/CVE-2022-46871.html https://www.suse.com/security/cve/CVE-2022-46877.html https://www.suse.com/security/cve/CVE-2023-23598.html https://www.suse.com/security/cve/CVE-2023-23601.html https://www.suse.com/security/cve/CVE-2023-23602.html https://www.suse.com/security/cve/CVE-2023-23603.html https://www.suse.com/security/cve/CVE-2023-23605.html https://bugzilla.suse.com/1207119


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds