SUSE Security Update: Security update for MozillaFirefox, mozilla-nss ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1449-1 Rating: important References: #935033 #935979 #940806 #940918 Cross-References: CVE-2015-2721 CVE-2015-2722 CVE-2015-2724 CVE-2015-2725 CVE-2015-2726 CVE-2015-2728 CVE-2015-2730 CVE-2015-2733 CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737 CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 CVE-2015-2743 CVE-2015-4000 CVE-2015-4473 CVE-2015-4474 CVE-2015-4475 CVE-2015-4478 CVE-2015-4479 CVE-2015-4484 CVE-2015-4485 CVE-2015-4486 CVE-2015-4487 CVE-2015-4488 CVE-2015-4489 CVE-2015-4491 CVE-2015-4492 CVE-2015-4495 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Server 11-SP1-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 SUSE Linux Enterprise Debuginfo 11-SP1 ______________________________________________________________________________ An update that fixes 31 vulnerabilities is now available. Description: Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release). Security issues fixed: - MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader - MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2) - MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file - MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties - MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright - MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript - MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images - MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video - MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection - MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers The following vulnerabilities were fixed in ESR31 and are also included here: - CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979). - CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979). - CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979). - CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979). - CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2 015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979). - CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979). - CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033). - CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979). This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR. Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses. Mozilla Firefox and mozilla-nss were updated to fix 17 security issues. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-mozilla-201507-12049=1 - SUSE Linux Enterprise Server 11-SP1-LTSS: zypper in -t patch slessp1-mozilla-201507-12049=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-mozilla-201507-12049=1 - SUSE Linux Enterprise Debuginfo 11-SP1: zypper in -t patch dbgsp1-mozilla-201507-12049=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): MozillaFirefox-38.2.0esr-10.1 MozillaFirefox-branding-SLED-31.0-0.5.7.11 MozillaFirefox-translations-38.2.0esr-10.1 firefox-libgcc_s1-4.7.2_20130108-0.37.2 firefox-libstdc++6-4.7.2_20130108-0.37.2 libfreebl3-3.19.2.0-0.7.1 mozilla-nss-3.19.2.0-0.7.1 mozilla-nss-devel-3.19.2.0-0.7.1 mozilla-nss-tools-3.19.2.0-0.7.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64): libfreebl3-32bit-3.19.2.0-0.7.1 mozilla-nss-32bit-3.19.2.0-0.7.1 - SUSE Linux Enterprise Server 11-SP1-LTSS (i586 s390x x86_64): MozillaFirefox-38.2.0esr-10.1 MozillaFirefox-branding-SLED-31.0-0.5.7.11 MozillaFirefox-translations-38.2.0esr-10.1 firefox-libgcc_s1-4.7.2_20130108-0.37.2 firefox-libstdc++6-4.7.2_20130108-0.37.2 libfreebl3-3.19.2.0-0.7.1 mozilla-nss-3.19.2.0-0.7.1 mozilla-nss-devel-3.19.2.0-0.7.1 mozilla-nss-tools-3.19.2.0-0.7.1 - SUSE Linux Enterprise Server 11-SP1-LTSS (s390x x86_64): libfreebl3-32bit-3.19.2.0-0.7.1 mozilla-nss-32bit-3.19.2.0-0.7.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): MozillaFirefox-debuginfo-38.2.0esr-10.1 MozillaFirefox-debugsource-38.2.0esr-10.1 mozilla-nss-debuginfo-3.19.2.0-0.7.1 mozilla-nss-debugsource-3.19.2.0-0.7.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64): mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1 - SUSE Linux Enterprise Debuginfo 11-SP1 (i586 s390x x86_64): MozillaFirefox-debuginfo-38.2.0esr-10.1 MozillaFirefox-debugsource-38.2.0esr-10.1 mozilla-nss-debuginfo-3.19.2.0-0.7.1 mozilla-nss-debugsource-3.19.2.0-0.7.1 - SUSE Linux Enterprise Debuginfo 11-SP1 (s390x x86_64): mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1 References: https://www.suse.com/security/cve/CVE-2015-2721.html https://www.suse.com/security/cve/CVE-2015-2722.html https://www.suse.com/security/cve/CVE-2015-2724.html https://www.suse.com/security/cve/CVE-2015-2725.html https://www.suse.com/security/cve/CVE-2015-2726.html https://www.suse.com/security/cve/CVE-2015-2728.html https://www.suse.com/security/cve/CVE-2015-2730.html https://www.suse.com/security/cve/CVE-2015-2733.html https://www.suse.com/security/cve/CVE-2015-2734.html https://www.suse.com/security/cve/CVE-2015-2735.html https://www.suse.com/security/cve/CVE-2015-2736.html https://www.suse.com/security/cve/CVE-2015-2737.html https://www.suse.com/security/cve/CVE-2015-2738.html https://www.suse.com/security/cve/CVE-2015-2739.html https://www.suse.com/security/cve/CVE-2015-2740.html https://www.suse.com/security/cve/CVE-2015-2743.html https://www.suse.com/security/cve/CVE-2015-4000.html https://www.suse.com/security/cve/CVE-2015-4473.html https://www.suse.com/security/cve/CVE-2015-4474.html https://www.suse.com/security/cve/CVE-2015-4475.html https://www.suse.com/security/cve/CVE-2015-4478.html https://www.suse.com/security/cve/CVE-2015-4479.html https://www.suse.com/security/cve/CVE-2015-4484.html https://www.suse.com/security/cve/CVE-2015-4485.html https://www.suse.com/security/cve/CVE-2015-4486.html https://www.suse.com/security/cve/CVE-2015-4487.html https://www.suse.com/security/cve/CVE-2015-4488.html https://www.suse.com/security/cve/CVE-2015-4489.html https://www.suse.com/security/cve/CVE-2015-4491.html https://www.suse.com/security/cve/CVE-2015-4492.html https://www.suse.com/security/cve/CVE-2015-4495.html https://bugzilla.suse.com/935033 https://bugzilla.suse.com/935979 https://bugzilla.suse.com/940806 https://bugzilla.suse.com/940918 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org