Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2021.3331.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2021:3331-1)
Summary:The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2021:3331-1 advisory.
Description:Summary:
The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2021:3331-1 advisory.

Vulnerability Insight:
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.2.0 ESR.

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes
MFSA 2021-45 (bsc#1191332)
* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Data race in crossbeam-deque

[link moved to references])

* CVE-2021-38500 (bmo#1725854, bmo#1728321)
Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15,
and Firefox ESR 91.2
* CVE-2021-38501 (bmo#1685354, bmo#1715755, bmo#1723176)
Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox Extended Support Release 91.0.1 ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
to be visible in non-private windows when viewing switch-to-
tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

- A number of user interface changes. For more information,
see the Firefox 89 release notes.
- Firefox now supports logging into Microsoft, work, and
school accounts using Windows single sign-on. Learn more
- On Windows, updates can now be applied in the background
while Firefox is not running.
- Firefox for Windows now offers a new page about:third-party
to help identify compatibility issues caused by third-party
applications
- Version 2 of Firefox's SmartBlock feature further improves
private browsing. Third party Facebook scripts are blocked to
prevent you from being tracked, but are now automatically
loaded 'just in time' if you decide to 'Log in with Facebook'
on any website.
- Enhanced the privacy of the Firefox Browser's Private
Browsing mode with Total Cookie Protection, which confines
cookies to the site where they were created, preventing
companis from using cookies to track your browsing across
sites. This feature was originally launched in Firefox's ETP
Strict mode.
- PDF forms now support JavaScript embedded in PDF files.
Some PDF forms use JavaScript for validation and other
interactive features.
- You'll encounter less website breakage in Private Browsing
and ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'MozillaFirefox' package(s) on SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 15-SP1, SUSE Linux Enterprise Server for SAP Applications 15, SUSE Linux Enterprise Server for SAP Applications 15-SP1.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-29980
https://security.gentoo.org/glsa/202202-03
https://security.gentoo.org/glsa/202208-14
https://bugzilla.mozilla.org/show_bug.cgi?id=1722204
https://www.mozilla.org/security/advisories/mfsa2021-33/
https://www.mozilla.org/security/advisories/mfsa2021-34/
https://www.mozilla.org/security/advisories/mfsa2021-35/
https://www.mozilla.org/security/advisories/mfsa2021-36/
Common Vulnerability Exposure (CVE) ID: CVE-2021-29981
https://bugzilla.mozilla.org/show_bug.cgi?id=1707774
Common Vulnerability Exposure (CVE) ID: CVE-2021-29982
https://bugzilla.mozilla.org/show_bug.cgi?id=1715318
Common Vulnerability Exposure (CVE) ID: CVE-2021-29983
https://bugzilla.mozilla.org/show_bug.cgi?id=1719088
Common Vulnerability Exposure (CVE) ID: CVE-2021-29984
https://bugzilla.mozilla.org/show_bug.cgi?id=1720031
Common Vulnerability Exposure (CVE) ID: CVE-2021-29985
https://bugzilla.mozilla.org/show_bug.cgi?id=1722083
Common Vulnerability Exposure (CVE) ID: CVE-2021-29986
https://bugzilla.mozilla.org/show_bug.cgi?id=1696138
Common Vulnerability Exposure (CVE) ID: CVE-2021-29987
https://bugzilla.mozilla.org/show_bug.cgi?id=1716129
Common Vulnerability Exposure (CVE) ID: CVE-2021-29988
https://bugzilla.mozilla.org/show_bug.cgi?id=1717922
Common Vulnerability Exposure (CVE) ID: CVE-2021-29989
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1662676%2C1666184%2C1719178%2C1719998%2C1720568
Common Vulnerability Exposure (CVE) ID: CVE-2021-29990
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1544190%2C1716481%2C1717778%2C1719319%2C1722073
Common Vulnerability Exposure (CVE) ID: CVE-2021-29991
https://bugzilla.mozilla.org/show_bug.cgi?id=1724896
https://www.mozilla.org/security/advisories/mfsa2021-37/
Common Vulnerability Exposure (CVE) ID: CVE-2021-32810
https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
Common Vulnerability Exposure (CVE) ID: CVE-2021-38492
https://bugzilla.mozilla.org/show_bug.cgi?id=1721107
https://www.mozilla.org/security/advisories/mfsa2021-38/
https://www.mozilla.org/security/advisories/mfsa2021-39/
https://www.mozilla.org/security/advisories/mfsa2021-40/
https://www.mozilla.org/security/advisories/mfsa2021-41/
https://www.mozilla.org/security/advisories/mfsa2021-42/
Common Vulnerability Exposure (CVE) ID: CVE-2021-38495
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723391%2C1723920%2C1724101%2C1724107
Common Vulnerability Exposure (CVE) ID: CVE-2021-38496
Debian Security Information: DSA-5034 (Google Search)
https://www.debian.org/security/2022/dsa-5034
https://bugzilla.mozilla.org/show_bug.cgi?id=1725335
https://www.mozilla.org/security/advisories/mfsa2021-43/
https://www.mozilla.org/security/advisories/mfsa2021-44/
https://www.mozilla.org/security/advisories/mfsa2021-45/
https://www.mozilla.org/security/advisories/mfsa2021-46/
https://www.mozilla.org/security/advisories/mfsa2021-47/
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-38497
https://bugzilla.mozilla.org/show_bug.cgi?id=1726621
Common Vulnerability Exposure (CVE) ID: CVE-2021-38498
https://bugzilla.mozilla.org/show_bug.cgi?id=1729642
Common Vulnerability Exposure (CVE) ID: CVE-2021-38500
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1725854%2C1728321
Common Vulnerability Exposure (CVE) ID: CVE-2021-38501
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685354%2C1715755%2C1723176
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.