Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2015:1449-1: important: Security update for MozillaFirefox, mozilla-nss

Recommended Posts

SUSE Security Update: Security update for MozillaFirefox, mozilla-nss

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2015:1449-1

Rating: important

References: #935033 #935979 #940806 #940918

Cross-References: CVE-2015-2721 CVE-2015-2722 CVE-2015-2724

CVE-2015-2725 CVE-2015-2726 CVE-2015-2728

CVE-2015-2730 CVE-2015-2733 CVE-2015-2734

CVE-2015-2735 CVE-2015-2736 CVE-2015-2737

CVE-2015-2738 CVE-2015-2739 CVE-2015-2740

CVE-2015-2743 CVE-2015-4000 CVE-2015-4473

CVE-2015-4474 CVE-2015-4475 CVE-2015-4478

CVE-2015-4479 CVE-2015-4484 CVE-2015-4485

CVE-2015-4486 CVE-2015-4487 CVE-2015-4488

CVE-2015-4489 CVE-2015-4491 CVE-2015-4492

CVE-2015-4495

Affected Products:

SUSE Linux Enterprise Server 11-SP2-LTSS

SUSE Linux Enterprise Server 11-SP1-LTSS

SUSE Linux Enterprise Debuginfo 11-SP2

SUSE Linux Enterprise Debuginfo 11-SP1

______________________________________________________________________________

 

An update that fixes 31 vulnerabilities is now available.

 

Description:

 

 

Mozilla Firefox is being updated to the current Firefox 38ESR branch

(specifically the 38.2.0ESR release).

 

Security issues fixed:

- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file

stealing via PDF reader

- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety

hazards (rv:40.0 / rv:38.2)

- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file

- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable

JavaScript object properties

- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright

- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in

JavaScript

- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling

bitmap images

- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx

when decoding WebM video

- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489:

Vulnerabilities found through code inspection

- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with

shared workers

 

The following vulnerabilities were fixed in ESR31 and are also included

here:

- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety

hazards (bsc#935979).

- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).

- CVE-2015-2730: ECDSA signature validation fails to handle some

signatures correctly (bsc#935979).

- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using

XMLHttpRequest (bsc#935979).

-

CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2

015-2739/CVE-2015-2740: Vulnerabilities found through code inspection

(bsc#935979).

- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).

- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE

cipher suites (bsc#935033).

- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange

(bsc#935979).

 

This update also contains a lot of feature improvements and bug fixes from

31ESR to 38ESR.

 

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which

is what Firefox 38ESR uses.

 

Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Server 11-SP2-LTSS:

 

zypper in -t patch slessp2-mozilla-201507-12049=1

 

- SUSE Linux Enterprise Server 11-SP1-LTSS:

 

zypper in -t patch slessp1-mozilla-201507-12049=1

 

- SUSE Linux Enterprise Debuginfo 11-SP2:

 

zypper in -t patch dbgsp2-mozilla-201507-12049=1

 

- SUSE Linux Enterprise Debuginfo 11-SP1:

 

zypper in -t patch dbgsp1-mozilla-201507-12049=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

 

MozillaFirefox-38.2.0esr-10.1

MozillaFirefox-branding-SLED-31.0-0.5.7.11

MozillaFirefox-translations-38.2.0esr-10.1

firefox-libgcc_s1-4.7.2_20130108-0.37.2

firefox-libstdc++6-4.7.2_20130108-0.37.2

libfreebl3-3.19.2.0-0.7.1

mozilla-nss-3.19.2.0-0.7.1

mozilla-nss-devel-3.19.2.0-0.7.1

mozilla-nss-tools-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):

 

libfreebl3-32bit-3.19.2.0-0.7.1

mozilla-nss-32bit-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Server 11-SP1-LTSS (i586 s390x x86_64):

 

MozillaFirefox-38.2.0esr-10.1

MozillaFirefox-branding-SLED-31.0-0.5.7.11

MozillaFirefox-translations-38.2.0esr-10.1

firefox-libgcc_s1-4.7.2_20130108-0.37.2

firefox-libstdc++6-4.7.2_20130108-0.37.2

libfreebl3-3.19.2.0-0.7.1

mozilla-nss-3.19.2.0-0.7.1

mozilla-nss-devel-3.19.2.0-0.7.1

mozilla-nss-tools-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Server 11-SP1-LTSS (s390x x86_64):

 

libfreebl3-32bit-3.19.2.0-0.7.1

mozilla-nss-32bit-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

 

MozillaFirefox-debuginfo-38.2.0esr-10.1

MozillaFirefox-debugsource-38.2.0esr-10.1

mozilla-nss-debuginfo-3.19.2.0-0.7.1

mozilla-nss-debugsource-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):

 

mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Debuginfo 11-SP1 (i586 s390x x86_64):

 

MozillaFirefox-debuginfo-38.2.0esr-10.1

MozillaFirefox-debugsource-38.2.0esr-10.1

mozilla-nss-debuginfo-3.19.2.0-0.7.1

mozilla-nss-debugsource-3.19.2.0-0.7.1

 

- SUSE Linux Enterprise Debuginfo 11-SP1 (s390x x86_64):

 

mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2015-2721.html

https://www.suse.com/security/cve/CVE-2015-2722.html

https://www.suse.com/security/cve/CVE-2015-2724.html

https://www.suse.com/security/cve/CVE-2015-2725.html

https://www.suse.com/security/cve/CVE-2015-2726.html

https://www.suse.com/security/cve/CVE-2015-2728.html

https://www.suse.com/security/cve/CVE-2015-2730.html

https://www.suse.com/security/cve/CVE-2015-2733.html

https://www.suse.com/security/cve/CVE-2015-2734.html

https://www.suse.com/security/cve/CVE-2015-2735.html

https://www.suse.com/security/cve/CVE-2015-2736.html

https://www.suse.com/security/cve/CVE-2015-2737.html

https://www.suse.com/security/cve/CVE-2015-2738.html

https://www.suse.com/security/cve/CVE-2015-2739.html

https://www.suse.com/security/cve/CVE-2015-2740.html

https://www.suse.com/security/cve/CVE-2015-2743.html

https://www.suse.com/security/cve/CVE-2015-4000.html

https://www.suse.com/security/cve/CVE-2015-4473.html

https://www.suse.com/security/cve/CVE-2015-4474.html

https://www.suse.com/security/cve/CVE-2015-4475.html

https://www.suse.com/security/cve/CVE-2015-4478.html

https://www.suse.com/security/cve/CVE-2015-4479.html

https://www.suse.com/security/cve/CVE-2015-4484.html

https://www.suse.com/security/cve/CVE-2015-4485.html

https://www.suse.com/security/cve/CVE-2015-4486.html

https://www.suse.com/security/cve/CVE-2015-4487.html

https://www.suse.com/security/cve/CVE-2015-4488.html

https://www.suse.com/security/cve/CVE-2015-4489.html

https://www.suse.com/security/cve/CVE-2015-4491.html

https://www.suse.com/security/cve/CVE-2015-4492.html

https://www.suse.com/security/cve/CVE-2015-4495.html

https://bugzilla.suse.com/935033

https://bugzilla.suse.com/935979

https://bugzilla.suse.com/940806

https://bugzilla.suse.com/940918

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×