Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.
Security Fix(es):
When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84.(CVE-2020-26979)
One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.(CVE-2021-23972)
{
"severity": "High"
}{
"src": [
"firefox-79.0-32.oe2003sp4.src.rpm"
],
"x86_64": [
"firefox-79.0-32.oe2003sp4.x86_64.rpm",
"firefox-debuginfo-79.0-32.oe2003sp4.x86_64.rpm",
"firefox-debugsource-79.0-32.oe2003sp4.x86_64.rpm",
"mozilla-crashreporter-firefox-debuginfo-79.0-32.oe2003sp4.x86_64.rpm"
],
"aarch64": [
"firefox-79.0-32.oe2003sp4.aarch64.rpm",
"firefox-debuginfo-79.0-32.oe2003sp4.aarch64.rpm",
"firefox-debugsource-79.0-32.oe2003sp4.aarch64.rpm"
]
}