SUSE Security Update: Security update for MozillaFirefox, mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1449-1
Rating: important
References: #935033 #935979 #940806 #940918
Cross-References: CVE-2015-2721 CVE-2015-2722 CVE-2015-2724
CVE-2015-2725 CVE-2015-2726 CVE-2015-2728
CVE-2015-2730 CVE-2015-2733 CVE-2015-2734
CVE-2015-2735 CVE-2015-2736 CVE-2015-2737
CVE-2015-2738 CVE-2015-2739 CVE-2015-2740
CVE-2015-2743 CVE-2015-4000 CVE-2015-4473
CVE-2015-4474 CVE-2015-4475 CVE-2015-4478
CVE-2015-4479 CVE-2015-4484 CVE-2015-4485
CVE-2015-4486 CVE-2015-4487 CVE-2015-4488
CVE-2015-4489 CVE-2015-4491 CVE-2015-4492
CVE-2015-4495
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Server 11-SP1-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
SUSE Linux Enterprise Debuginfo 11-SP1
______________________________________________________________________________
An update that fixes 31 vulnerabilities is now available.
Description:
Mozilla Firefox is being updated to the current Firefox 38ESR branch
(specifically the 38.2.0ESR release).
Security issues fixed:
– MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file
stealing via PDF reader
– MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety
hazards (rv:40.0 / rv:38.2)
– MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
– MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable
JavaScript object properties
– MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
– MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in
JavaScript
– MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling
bitmap images
– MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx
when decoding WebM video
– MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489:
Vulnerabilities found through code inspection
– MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with
shared workers
The following vulnerabilities were fixed in ESR31 and are also included
here:
– CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety
hazards (bsc#935979).
– CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
– CVE-2015-2730: ECDSA signature validation fails to handle some
signatures correctly (bsc#935979).
– CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using
XMLHttpRequest (bsc#935979).
–
CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2
015-2739/CVE-2015-2740: Vulnerabilities found through code inspection
(bsc#935979).
– CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
– CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE
cipher suites (bsc#935033).
– CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange
(bsc#935979).
This update also contains a lot of feature improvements and bug fixes from
31ESR to 38ESR.
Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which
is what Firefox 38ESR uses.
Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-mozilla-201507-12049=1
– SUSE Linux Enterprise Server 11-SP1-LTSS:
zypper in -t patch slessp1-mozilla-201507-12049=1
– SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-mozilla-201507-12049=1
– SUSE Linux Enterprise Debuginfo 11-SP1:
zypper in -t patch dbgsp1-mozilla-201507-12049=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
MozillaFirefox-38.2.0esr-10.1
MozillaFirefox-branding-SLED-31.0-0.5.7.11
MozillaFirefox-translations-38.2.0esr-10.1
firefox-libgcc_s1-4.7.2_20130108-0.37.2
firefox-libstdc++6-4.7.2_20130108-0.37.2
libfreebl3-3.19.2.0-0.7.1
mozilla-nss-3.19.2.0-0.7.1
mozilla-nss-devel-3.19.2.0-0.7.1
mozilla-nss-tools-3.19.2.0-0.7.1
– SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):
libfreebl3-32bit-3.19.2.0-0.7.1
mozilla-nss-32bit-3.19.2.0-0.7.1
– SUSE Linux Enterprise Server 11-SP1-LTSS (i586 s390x x86_64):
MozillaFirefox-38.2.0esr-10.1
MozillaFirefox-branding-SLED-31.0-0.5.7.11
MozillaFirefox-translations-38.2.0esr-10.1
firefox-libgcc_s1-4.7.2_20130108-0.37.2
firefox-libstdc++6-4.7.2_20130108-0.37.2
libfreebl3-3.19.2.0-0.7.1
mozilla-nss-3.19.2.0-0.7.1
mozilla-nss-devel-3.19.2.0-0.7.1
mozilla-nss-tools-3.19.2.0-0.7.1
– SUSE Linux Enterprise Server 11-SP1-LTSS (s390x x86_64):
libfreebl3-32bit-3.19.2.0-0.7.1
mozilla-nss-32bit-3.19.2.0-0.7.1
– SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):
MozillaFirefox-debuginfo-38.2.0esr-10.1
MozillaFirefox-debugsource-38.2.0esr-10.1
mozilla-nss-debuginfo-3.19.2.0-0.7.1
mozilla-nss-debugsource-3.19.2.0-0.7.1
– SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):
mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1
– SUSE Linux Enterprise Debuginfo 11-SP1 (i586 s390x x86_64):
MozillaFirefox-debuginfo-38.2.0esr-10.1
MozillaFirefox-debugsource-38.2.0esr-10.1
mozilla-nss-debuginfo-3.19.2.0-0.7.1
mozilla-nss-debugsource-3.19.2.0-0.7.1
– SUSE Linux Enterprise Debuginfo 11-SP1 (s390x x86_64):
mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1
References:
https://www.suse.com/security/cve/CVE-2015-2721.html
https://www.suse.com/security/cve/CVE-2015-2722.html
https://www.suse.com/security/cve/CVE-2015-2724.html
https://www.suse.com/security/cve/CVE-2015-2725.html
https://www.suse.com/security/cve/CVE-2015-2726.html
https://www.suse.com/security/cve/CVE-2015-2728.html
https://www.suse.com/security/cve/CVE-2015-2730.html
https://www.suse.com/security/cve/CVE-2015-2733.html
https://www.suse.com/security/cve/CVE-2015-2734.html
https://www.suse.com/security/cve/CVE-2015-2735.html
https://www.suse.com/security/cve/CVE-2015-2736.html
https://www.suse.com/security/cve/CVE-2015-2737.html
https://www.suse.com/security/cve/CVE-2015-2738.html
https://www.suse.com/security/cve/CVE-2015-2739.html
https://www.suse.com/security/cve/CVE-2015-2740.html
https://www.suse.com/security/cve/CVE-2015-2743.html
https://www.suse.com/security/cve/CVE-2015-4000.html
https://www.suse.com/security/cve/CVE-2015-4473.html
https://www.suse.com/security/cve/CVE-2015-4474.html
https://www.suse.com/security/cve/CVE-2015-4475.html
https://www.suse.com/security/cve/CVE-2015-4478.html
https://www.suse.com/security/cve/CVE-2015-4479.html
https://www.suse.com/security/cve/CVE-2015-4484.html
https://www.suse.com/security/cve/CVE-2015-4485.html
https://www.suse.com/security/cve/CVE-2015-4486.html
https://www.suse.com/security/cve/CVE-2015-4487.html
https://www.suse.com/security/cve/CVE-2015-4488.html
https://www.suse.com/security/cve/CVE-2015-4489.html
https://www.suse.com/security/cve/CVE-2015-4491.html
https://www.suse.com/security/cve/CVE-2015-4492.html
https://www.suse.com/security/cve/CVE-2015-4495.html
https://bugzilla.suse.com/935033
https://bugzilla.suse.com/935979
https://bugzilla.suse.com/940806
https://bugzilla.suse.com/940918
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org