[RHSA-2022:6702] firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.3.0 ESR.
Security Fix(es):
Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959)
Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960)
Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962)
Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958)
Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956)
Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/firefox?arch=x86_64&distro=redhat-8.6 | < 102.3.0-6.el8_6 |
pkg:rpm/redhat/firefox?arch=s390x&distro=redhat-8.6 | < 102.3.0-6.el8_6 |
pkg:rpm/redhat/firefox?arch=ppc64le&distro=redhat-8.6 | < 102.3.0-6.el8_6 |
pkg:rpm/redhat/firefox?arch=aarch64&distro=redhat-8.6 | < 102.3.0-6.el8_6 |
- ID
- RHSA-2022:6702
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:6702
- Published
-
2022-09-26T00:00:00
(2 years ago) - Modified
-
2022-09-26T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2022-1900
- ALPINE:CVE-2022-40956
- ALPINE:CVE-2022-40957
- ALPINE:CVE-2022-40958
- ALPINE:CVE-2022-40959
- ALPINE:CVE-2022-40960
- ALPINE:CVE-2022-40962
- ALSA-2022:6700
- ALSA-2022:6702
- ALSA-2022:6708
- ALSA-2022:6717
- DSA-5237-1
- DSA-5238-1
- ELSA-2022-6700
- ELSA-2022-6702
- ELSA-2022-6708
- ELSA-2022-6710
- ELSA-2022-6711
- ELSA-2022-6717
- GLSA-202209-18
- GLSA-202209-27
- MFSA-2022-40
- MFSA-2022-41
- MFSA-2022-42
- RHSA-2022:6700
- RHSA-2022:6708
- RHSA-2022:6710
- RHSA-2022:6711
- RHSA-2022:6717
- RLSA-2022:6702
- RLSA-2022:6708
- SSA:2022-263-02
- SUSE-SU-2022:3396-1
- SUSE-SU-2022:3440-1
- SUSE-SU-2022:3441-1
- SUSE-SU-2022:3800-1
- USN-5649-1
- USN-5724-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2128792 | https://bugzilla.redhat.com/2128792 | |
Bugzilla | 2128793 | https://bugzilla.redhat.com/2128793 | |
Bugzilla | 2128794 | https://bugzilla.redhat.com/2128794 | |
Bugzilla | 2128795 | https://bugzilla.redhat.com/2128795 | |
Bugzilla | 2128796 | https://bugzilla.redhat.com/2128796 | |
Bugzilla | 2128797 | https://bugzilla.redhat.com/2128797 | |
RHSA | RHSA-2022:6702 | https://access.redhat.com/errata/RHSA-2022:6702 | |
CVE | CVE-2022-40956 | https://access.redhat.com/security/cve/CVE-2022-40956 | |
CVE | CVE-2022-40957 | https://access.redhat.com/security/cve/CVE-2022-40957 | |
CVE | CVE-2022-40958 | https://access.redhat.com/security/cve/CVE-2022-40958 | |
CVE | CVE-2022-40959 | https://access.redhat.com/security/cve/CVE-2022-40959 | |
CVE | CVE-2022-40960 | https://access.redhat.com/security/cve/CVE-2022-40960 | |
CVE | CVE-2022-40962 | https://access.redhat.com/security/cve/CVE-2022-40962 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/firefox?arch=x86_64&distro=redhat-8.6 | redhat | firefox | < 102.3.0-6.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/firefox?arch=s390x&distro=redhat-8.6 | redhat | firefox | < 102.3.0-6.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/firefox?arch=ppc64le&distro=redhat-8.6 | redhat | firefox | < 102.3.0-6.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/firefox?arch=aarch64&distro=redhat-8.6 | redhat | firefox | < 102.3.0-6.el8_6 | redhat-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |