QID 239936
Date Published: 2021-12-09
QID 239936: Red Hat Update for firefox (RHSA-2021:5013)
mozilla firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):- mozilla: memory safety bugs fixed in firefox 95 and firefox esr 91.4
- mozilla: url leakage when navigating while executing asynchronous function (cve-2021-43536)
- mozilla: heap buffer overflow when using structured clone (cve-2021-43537)
- mozilla: missing fullscreen and pointer lock notification when requesting both (cve-2021-43538)
- mozilla: gc rooting failure when calling wasm instance methods (cve-2021-43539)
- mozilla: external protocol handler parameters were unescaped (cve-2021-43541)
- mozilla: xmlhttprequest error codes could have leaked the existence of an external protocol handler (cve-2021-43542)
- mozilla: bypass of csp sandbox directive when embedding (cve-2021-43543)
- mozilla: denial of service when using the location api in a loop (cve-2021-43545)
- mozilla: cursor spoofing could overlay user interface when native cursor is zoomed (cve-2021-43546)
<H2></H2>
- Red Hat enterprise linux for x86_64 8 x86_64
- Red Hat enterprise linux for ibm z systems 8 s390x
- Red Hat enterprise linux for power, little endian 8 ppc64le
- Red Hat enterprise linux for arm 64 8 aarch64
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Red Hat security advisory RHSA-2021:5013 for updates and patch information.
Vendor References
- RHSA-2021:5013 -
access.redhat.com/errata/RHSA-2021:5013
CVEs related to QID 239936
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2021:5013 | Red Hat Enterprise Linux |
|