File _patchinfo of Package patchinfo.26787
<patchinfo incident="26787">
<issue tracker="bnc" id="1205270">VUL-0: MozillaFirefox / MozillaThunderbird: update to 107 and 102.5esr</issue>
<issue tracker="cve" id="2022-45403"/>
<issue tracker="cve" id="2022-45404"/>
<issue tracker="cve" id="2022-45405"/>
<issue tracker="cve" id="2022-45406"/>
<issue tracker="cve" id="2022-45408"/>
<issue tracker="cve" id="2022-45409"/>
<issue tracker="cve" id="2022-45410"/>
<issue tracker="cve" id="2022-45411"/>
<issue tracker="cve" id="2022-45412"/>
<issue tracker="cve" id="2022-45416"/>
<issue tracker="cve" id="2022-45418"/>
<issue tracker="cve" id="2022-45420"/>
<issue tracker="cve" id="2022-45421"/>
<packager>MSirringhaus</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for MozillaFirefox</summary>
<description>This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):
- CVE-2022-45403: Service Workers might have learned size of cross-origin media files
- CVE-2022-45404: Fullscreen notification bypass
- CVE-2022-45405: Use-after-free in InputStream implementation
- CVE-2022-45406: Use-after-free of a JavaScript Realm
- CVE-2022-45408: Fullscreen notification bypass via windowName
- CVE-2022-45409: Use-after-free in Garbage Collection
- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy
- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers
- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
- CVE-2022-45416: Keystroke Side-Channel Leakage
- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI
- CVE-2022-45420: Iframe contents could be rendered outside the iframe
- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
</description>
</patchinfo>