openSUSE-SU-2021:3993-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2021:3993-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2021:3993-1
Related
Published
2021-12-10T14:04:25Z
Modified
2021-12-10T14:04:25Z
Summary
Security update for MozillaFirefox
Details

This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

  • CVE-2021-43536: URL leakage when navigating while executing asynchronous function
  • CVE-2021-43537: Heap buffer overflow when using structured clone
  • CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
  • CVE-2021-43539: GC rooting failure when calling wasm instance methods
  • CVE-2021-43541: External protocol handler parameters were unescaped
  • CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
  • CVE-2021-43543: Bypass of CSP sandbox directive when embedding
  • CVE-2021-43545: Denial of Service when using the Location API in a loop
  • CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
  • Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
  • Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
References

Affected packages

openSUSE:Leap 15.3 / MozillaFirefox

Package

Name
MozillaFirefox
Purl
pkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.4.0-152.9.1

Ecosystem specific

{
    "binaries": [
        {
            "MozillaFirefox": "91.4.0-152.9.1",
            "MozillaFirefox-translations-common": "91.4.0-152.9.1",
            "MozillaFirefox-devel": "91.4.0-152.9.1",
            "MozillaFirefox-translations-other": "91.4.0-152.9.1",
            "MozillaFirefox-branding-upstream": "91.4.0-152.9.1"
        }
    ]
}