- Issued:
- 2022-03-10
- Updated:
- 2022-03-10
RHSA-2022:0824 - Critical: firefox security and bug fix update
Synopsis
Critical: firefox security and bug fix update
Type/Severity
Security Advisory Critical
Topic
An update for firefox is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 91.7.0 ESR.
Security Fix(es):
-
Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485)
-
Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486)
-
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
-
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)
-
expat: Integer overflow in storeRawNames() (CVE-2022-25315)
-
Mozilla: Use-after-free in text reflows (CVE-2022-26381)
-
Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383)
-
Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384)
-
Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387)
-
Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Firefox 91.3.0-1 Language packs installed at /usr/lib64/firefox/langpacks cannot be used any more (BZ#2030190)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Firefox must be restarted for the changes to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, little endian | 7 | ppc64le |
| Red Hat Enterprise Linux for Power, big endian | 7 | ppc64 |
| Red Hat Enterprise Linux for IBM z Systems | 7 | s390x |
| Red Hat Enterprise Linux Workstation | 7 | x86_64 |
| Red Hat Enterprise Linux Server | 7 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 7 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian | 7 | ppc64le |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian | 7 | ppc64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | 7 | s390x |
| Red Hat Enterprise Linux Desktop | 7 | x86_64 |
Updated Packages
- firefox-91.7.0-3.el7_9.s390x.rpm
- firefox-debuginfo-91.7.0-3.el7_9.ppc64le.rpm
- firefox-91.7.0-3.el7_9.ppc64le.rpm
- firefox-debuginfo-91.7.0-3.el7_9.s390x.rpm
- firefox-debuginfo-91.7.0-3.el7_9.x86_64.rpm
- firefox-91.7.0-3.el7_9.ppc64.rpm
- firefox-91.7.0-3.el7_9.src.rpm
- firefox-91.7.0-3.el7_9.i686.rpm
- firefox-91.7.0-3.el7_9.x86_64.rpm
- firefox-debuginfo-91.7.0-3.el7_9.ppc64.rpm
Fixes
- This content is not included.BZ - 2030190
- This content is not included.BZ - 2056363
- This content is not included.BZ - 2056366
- This content is not included.BZ - 2056370
- This content is not included.BZ - 2061735
- This content is not included.BZ - 2061736
- This content is not included.BZ - 2062220
- This content is not included.BZ - 2062221
- This content is not included.BZ - 2062222
- This content is not included.BZ - 2062223
- This content is not included.BZ - 2062224
CVEs
- CVE-2022-22822
- CVE-2022-22823
- CVE-2022-22824
- CVE-2022-25235
- CVE-2022-25236
- CVE-2022-25315
- CVE-2022-26381
- CVE-2022-26383
- CVE-2022-26384
- CVE-2022-26386
- CVE-2022-26387
- CVE-2022-26485
- CVE-2022-26486
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.