Headline
RHSA-2022:4872: Red Hat Security Advisory: firefox security update
An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-31736: Mozilla: Cross-Origin resource’s length leaked
- CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL
- CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode
- CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64
- CVE-2022-31741: Mozilla: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-06-01
Updated:
2022-06-01
RHSA-2022:4872 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: firefox security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for firefox is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 91.10.0 ESR.
Security Fix(es):
- Mozilla: Cross-Origin resource’s length leaked (CVE-2022-31736)
- Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737)
- Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738)
- Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740)
- Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741)
- Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747)
- Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Firefox must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2092018 - CVE-2022-31736 Mozilla: Cross-Origin resource’s length leaked
- BZ - 2092019 - CVE-2022-31737 Mozilla: Heap buffer overflow in WebGL
- BZ - 2092021 - CVE-2022-31738 Mozilla: Browser window spoof using fullscreen mode
- BZ - 2092023 - CVE-2022-31740 Mozilla: Register allocation problem in WASM on arm64
- BZ - 2092024 - CVE-2022-31741 Mozilla: Uninitialized variable leads to invalid memory read
- BZ - 2092025 - CVE-2022-31742 Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- BZ - 2092026 - CVE-2022-31747 Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
CVEs
- CVE-2022-31736
- CVE-2022-31737
- CVE-2022-31738
- CVE-2022-31740
- CVE-2022-31741
- CVE-2022-31742
- CVE-2022-31747
Red Hat Enterprise Linux for x86_64 8
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
x86_64
firefox-91.10.0-1.el8_6.x86_64.rpm
SHA-256: e7320ecb4ebece17861312df4ecdd3c31fb4fddbe570a9fe29457bfc5086d962
firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm
SHA-256: 6a4a35e6126c6e9f1b3a1396002782a00f06c44c4abfc202bde4852593eec4ef
firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm
SHA-256: b837b1ac979418eb9b657c7022e07c2ce13559e1c9e97bb16f68a0de7041bd23
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
x86_64
firefox-91.10.0-1.el8_6.x86_64.rpm
SHA-256: e7320ecb4ebece17861312df4ecdd3c31fb4fddbe570a9fe29457bfc5086d962
firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm
SHA-256: 6a4a35e6126c6e9f1b3a1396002782a00f06c44c4abfc202bde4852593eec4ef
firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm
SHA-256: b837b1ac979418eb9b657c7022e07c2ce13559e1c9e97bb16f68a0de7041bd23
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
x86_64
firefox-91.10.0-1.el8_6.x86_64.rpm
SHA-256: e7320ecb4ebece17861312df4ecdd3c31fb4fddbe570a9fe29457bfc5086d962
firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm
SHA-256: 6a4a35e6126c6e9f1b3a1396002782a00f06c44c4abfc202bde4852593eec4ef
firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm
SHA-256: b837b1ac979418eb9b657c7022e07c2ce13559e1c9e97bb16f68a0de7041bd23
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
s390x
firefox-91.10.0-1.el8_6.s390x.rpm
SHA-256: 3a8df802d10cf5fdab23c3dabd2a1c8ab5f2fe4814585add4e19369663f6c5fc
firefox-debuginfo-91.10.0-1.el8_6.s390x.rpm
SHA-256: cc73f1233daff4a8c2639b04ea863cef1f548059bd41fbddd0067d4f59408fc7
firefox-debugsource-91.10.0-1.el8_6.s390x.rpm
SHA-256: 869a11976b3abc9c8b2f1cd9bf1bca499eb6dfbc5b018ebce61631bed213cd05
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
s390x
firefox-91.10.0-1.el8_6.s390x.rpm
SHA-256: 3a8df802d10cf5fdab23c3dabd2a1c8ab5f2fe4814585add4e19369663f6c5fc
firefox-debuginfo-91.10.0-1.el8_6.s390x.rpm
SHA-256: cc73f1233daff4a8c2639b04ea863cef1f548059bd41fbddd0067d4f59408fc7
firefox-debugsource-91.10.0-1.el8_6.s390x.rpm
SHA-256: 869a11976b3abc9c8b2f1cd9bf1bca499eb6dfbc5b018ebce61631bed213cd05
Red Hat Enterprise Linux for Power, little endian 8
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
ppc64le
firefox-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: cb7c2ec760e4ab2932b01957d6e123e5643948ee73e972aa518447ada6beaba2
firefox-debuginfo-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: 6a5807c0ce92f09628d0926af4e8df37cff9bb2c72db335b81ecb238c19b84ae
firefox-debugsource-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: 11c9797a90e70c1a1f12f6faa1690e24f9114ece118697433eab3d4fcd5e9caf
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
ppc64le
firefox-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: cb7c2ec760e4ab2932b01957d6e123e5643948ee73e972aa518447ada6beaba2
firefox-debuginfo-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: 6a5807c0ce92f09628d0926af4e8df37cff9bb2c72db335b81ecb238c19b84ae
firefox-debugsource-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: 11c9797a90e70c1a1f12f6faa1690e24f9114ece118697433eab3d4fcd5e9caf
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
x86_64
firefox-91.10.0-1.el8_6.x86_64.rpm
SHA-256: e7320ecb4ebece17861312df4ecdd3c31fb4fddbe570a9fe29457bfc5086d962
firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm
SHA-256: 6a4a35e6126c6e9f1b3a1396002782a00f06c44c4abfc202bde4852593eec4ef
firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm
SHA-256: b837b1ac979418eb9b657c7022e07c2ce13559e1c9e97bb16f68a0de7041bd23
Red Hat Enterprise Linux for ARM 64 8
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
aarch64
firefox-91.10.0-1.el8_6.aarch64.rpm
SHA-256: 18919c9f47d957677e23c53c0d616fd67a4abeff6fcb646ab317b559e7ac4a1d
firefox-debuginfo-91.10.0-1.el8_6.aarch64.rpm
SHA-256: 6bcc749df9c57d95a22ac9644be434f8fda8d58b6666e45cff6fa2358fc3edfa
firefox-debugsource-91.10.0-1.el8_6.aarch64.rpm
SHA-256: 752837ce1d1190e2cdba7bc7b231c80c7daf194560454fcee99724c7bca19489
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
aarch64
firefox-91.10.0-1.el8_6.aarch64.rpm
SHA-256: 18919c9f47d957677e23c53c0d616fd67a4abeff6fcb646ab317b559e7ac4a1d
firefox-debuginfo-91.10.0-1.el8_6.aarch64.rpm
SHA-256: 6bcc749df9c57d95a22ac9644be434f8fda8d58b6666e45cff6fa2358fc3edfa
firefox-debugsource-91.10.0-1.el8_6.aarch64.rpm
SHA-256: 752837ce1d1190e2cdba7bc7b231c80c7daf194560454fcee99724c7bca19489
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
ppc64le
firefox-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: cb7c2ec760e4ab2932b01957d6e123e5643948ee73e972aa518447ada6beaba2
firefox-debuginfo-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: 6a5807c0ce92f09628d0926af4e8df37cff9bb2c72db335b81ecb238c19b84ae
firefox-debugsource-91.10.0-1.el8_6.ppc64le.rpm
SHA-256: 11c9797a90e70c1a1f12f6faa1690e24f9114ece118697433eab3d4fcd5e9caf
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.6
SRPM
firefox-91.10.0-1.el8_6.src.rpm
SHA-256: 0906128efc3c3ddfbd3ba2a075034d909ed0cd5701722db7a604ec09dffdc3c3
x86_64
firefox-91.10.0-1.el8_6.x86_64.rpm
SHA-256: e7320ecb4ebece17861312df4ecdd3c31fb4fddbe570a9fe29457bfc5086d962
firefox-debuginfo-91.10.0-1.el8_6.x86_64.rpm
SHA-256: 6a4a35e6126c6e9f1b3a1396002782a00f06c44c4abfc202bde4852593eec4ef
firefox-debugsource-91.10.0-1.el8_6.x86_64.rpm
SHA-256: b837b1ac979418eb9b657c7022e07c2ce13559e1c9e97bb16f68a0de7041bd23
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.
Related news
Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10.
Gentoo Linux Security Advisory 202208-8 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 91.12.0:esr are affected.
Ubuntu Security Notice 5494-1 - It was discovered that SpiderMonkey JavaScript Library incorrectly generated certain assembly code. An remote attacker could possibly use this issue to cause a crash or expose sensitive information. It was discovered that SpiderMonkey JavaScript Library incorrectly generated certain assembly code. An remote attacker could possibly use this issue to cause a crash.
Red Hat Security Advisory 2022-4887-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.10.0. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4890-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.10.0. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4888-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.10.0. Issues addressed include a buffer overflow vulnerability.
An update for thunderbird is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1834: Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation p...
An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1834: Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-3...
An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1834: Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozi...
Red Hat Security Advisory 2022-4872-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4875-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4871-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4870-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4873-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4876-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.10.0 ESR. Issues addressed include a buffer overflow vulnerability.
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invali...
An update for firefox is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invalid memory read * CVE-2022-31742: Mozi...
An update for firefox is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invalid memory r...
An update for firefox is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invalid memory r...
An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31736: Mozilla: Cross-Origin resource's length leaked * CVE-2022-31737: Mozilla: Heap buffer overflow in WebGL * CVE-2022-31738: Mozilla: Browser window spoof using fullscreen mode * CVE-2022-31740: Mozilla: Register allocation problem in WASM on arm64 * CVE-2022-31741: Mozilla: Uninitialized variable leads to invalid memory read * CVE-2022-31742: Mozi...