firefox-78.10.0-1.0.1.el7
エラータID: AXSA:2021-1724:11
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance, and portability.
This update upgrades Firefox to version 78.10.0 ESR.
Security Fix(es):
* Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994)
* Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995)
* Mozilla: More internal network hosts could have been probed by a malicious
webpage (CVE-2021-23961)
* Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998)
* Mozilla: Blob URLs may have been granted additional privileges
(CVE-2021-23999)
* Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL
(CVE-2021-24002)
* Mozilla: Incorrect size computation in WebAssembly JIT could lead to
null-reads (CVE-2021-29945)
* Mozilla: Port blocking could be bypassed (CVE-2021-29946)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2021-23961
Further techniques that built on the slipstream research combined with a
malicious webpage could have exposed both an internal network's hosts as well as
services running on the user's local machine. This vulnerability affects Firefox
< 85.
CVE-2021-23994
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
CVE-2021-23995
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
CVE-2021-23998
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
CVE-2021-23999
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
CVE-2021-24002
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
CVE-2021-29945
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
CVE-2021-29946
** RESERVED ** This candidate has been reserved by an organization or individual
that will use it when announcing a new security problem. When the candidate has
been publicized, the details for this candidate will be provided.
Update packages.
Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 85.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
N/A
SRPMS
- firefox-78.10.0-1.0.1.el7.src.rpm
MD5: fb0d48739f201c7a7d238abc4af36018
SHA-256: 62bda0bc853314601e942eebf85f13cbf79b8aebd30b9d6c8e0383b431380f04
Size: 674.53 MB
Asianux Server 7 for x86_64
- firefox-78.10.0-1.0.1.el7.x86_64.rpm
MD5: a4a99319307f438520e8f3465e76113d
SHA-256: 8df32a33c19f43203581a212a02298ee63903fbde853c4fb991b3243a4dc9af4
Size: 101.73 MB - firefox-78.10.0-1.0.1.el7.i686.rpm
MD5: ecb5a262f0e0e28a90361773aecbcabd
SHA-256: dec98b4108904ac2b949f5dbfb9835cc6feae91f492de3f4cfcd8979e2958362
Size: 103.45 MB