openSUSE Security Update: Security update update for MozillaFirefox, mozilla-nss ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1211-1 Rating: important References: #977333 #977373 #977375 #977376 #977379 #977381 #977382 #977384 #977386 #977388 Cross-References: CVE-2016-2804 CVE-2016-2806 CVE-2016-2807 CVE-2016-2808 CVE-2016-2811 CVE-2016-2812 CVE-2016-2814 CVE-2016-2816 CVE-2016-2817 CVE-2016-2820 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: This update to Mozilla Firefox 46.0 fixes several security issues and bugs (boo#977333). The following vulnerabilities were fixed: - CVE-2016-2804: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977373) - CVE-2016-2806: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977375) - CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977376) - CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (boo#977386) - CVE-2016-2811: Use-after-free in Service Worker - MFSA 2016-42 (boo#977379) - CVE-2016-2812: Buffer overflow in Service Worker - MFSA 2016-42 (boo#977379) - CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (boo#977381) - CVE-2016-2816: CSP not applied to pages sent with multipart/x-mixed-replace - MFSA 2016-45 (boo#977382) - CVE-2016-2817: Elevation of privilege with chrome.tabs.update API in web extensions - MFSA 2016-46 (boo#977384) - CVE-2016-2820: Firefox Health Reports could accept events from untrusted domains - MFSA 2016-48 (boo#977388) The following miscellaneous changes are included: - Improved security of the JavaScript Just In Time (JIT) Compiler - WebRTC fixes to improve performance and stability - Added support for document.elementsFromPoint - Added HKDF support for Web Crypto API The following changes from Mozilla Firefox 45.0.2 are included: - Fix an issue impacting the cookie header when third-party cookies are blocked - Fix a web compatibility regression impacting the srcset attribute of the image tag - Fix a crash impacting the video playback with Media Source Extension - Fix a regression impacting some specific uploads - Fix a regression with the copy and paste with some old versions of some Gecko applications like Thunderbird The following changes from Mozilla Firefox 45.0.2 are included: - Fix a regression causing search engine settings to be lost in some context - Bring back non-standard jar: URIs to fix a regression in IBM iNotes - XSLTProcessor.importStylesheet was failing when import was used - Fix an issue which could cause the list of search provider to be empty - Fix a regression when using the location bar (bmo#1254503) - Fix some loading issues when Accept third-party cookies: was set to Never - Disabled Graphite font shaping library The minimum requirements increased to NSPR 4.12 and NSS 3.22.3. Mozilla NSS was updated to 3.22.3 as a dependency for Mozilla Firefox 46.0, with the following changes: - Increase compatibility of TLS extended master secret, don't send an empty TLS extension last in the handshake (bmo#1243641) - RSA-PSS signatures are now supported - Pseudorandom functions based on hashes other than SHA-1 are now supported - Enforce an External Policy on NSS from a config file Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-541=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-541=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): MozillaFirefox-46.0-21.1 MozillaFirefox-branding-upstream-46.0-21.1 MozillaFirefox-buildsymbols-46.0-21.1 MozillaFirefox-debuginfo-46.0-21.1 MozillaFirefox-debugsource-46.0-21.1 MozillaFirefox-devel-46.0-21.1 MozillaFirefox-translations-common-46.0-21.1 MozillaFirefox-translations-other-46.0-21.1 libfreebl3-3.22.3-15.2 libfreebl3-debuginfo-3.22.3-15.2 libsoftokn3-3.22.3-15.2 libsoftokn3-debuginfo-3.22.3-15.2 mozilla-nss-3.22.3-15.2 mozilla-nss-certs-3.22.3-15.2 mozilla-nss-certs-debuginfo-3.22.3-15.2 mozilla-nss-debuginfo-3.22.3-15.2 mozilla-nss-debugsource-3.22.3-15.2 mozilla-nss-devel-3.22.3-15.2 mozilla-nss-sysinit-3.22.3-15.2 mozilla-nss-sysinit-debuginfo-3.22.3-15.2 mozilla-nss-tools-3.22.3-15.2 mozilla-nss-tools-debuginfo-3.22.3-15.2 - openSUSE Leap 42.1 (x86_64): libfreebl3-32bit-3.22.3-15.2 libfreebl3-debuginfo-32bit-3.22.3-15.2 libsoftokn3-32bit-3.22.3-15.2 libsoftokn3-debuginfo-32bit-3.22.3-15.2 mozilla-nss-32bit-3.22.3-15.2 mozilla-nss-certs-32bit-3.22.3-15.2 mozilla-nss-certs-debuginfo-32bit-3.22.3-15.2 mozilla-nss-debuginfo-32bit-3.22.3-15.2 mozilla-nss-sysinit-32bit-3.22.3-15.2 mozilla-nss-sysinit-debuginfo-32bit-3.22.3-15.2 - openSUSE 13.2 (i586 x86_64): MozillaFirefox-46.0-68.1 MozillaFirefox-branding-upstream-46.0-68.1 MozillaFirefox-buildsymbols-46.0-68.1 MozillaFirefox-debuginfo-46.0-68.1 MozillaFirefox-debugsource-46.0-68.1 MozillaFirefox-devel-46.0-68.1 MozillaFirefox-translations-common-46.0-68.1 MozillaFirefox-translations-other-46.0-68.1 libfreebl3-3.22.3-31.1 libfreebl3-debuginfo-3.22.3-31.1 libsoftokn3-3.22.3-31.1 libsoftokn3-debuginfo-3.22.3-31.1 mozilla-nss-3.22.3-31.1 mozilla-nss-certs-3.22.3-31.1 mozilla-nss-certs-debuginfo-3.22.3-31.1 mozilla-nss-debuginfo-3.22.3-31.1 mozilla-nss-debugsource-3.22.3-31.1 mozilla-nss-devel-3.22.3-31.1 mozilla-nss-sysinit-3.22.3-31.1 mozilla-nss-sysinit-debuginfo-3.22.3-31.1 mozilla-nss-tools-3.22.3-31.1 mozilla-nss-tools-debuginfo-3.22.3-31.1 - openSUSE 13.2 (x86_64): libfreebl3-32bit-3.22.3-31.1 libfreebl3-debuginfo-32bit-3.22.3-31.1 libsoftokn3-32bit-3.22.3-31.1 libsoftokn3-debuginfo-32bit-3.22.3-31.1 mozilla-nss-32bit-3.22.3-31.1 mozilla-nss-certs-32bit-3.22.3-31.1 mozilla-nss-certs-debuginfo-32bit-3.22.3-31.1 mozilla-nss-debuginfo-32bit-3.22.3-31.1 mozilla-nss-sysinit-32bit-3.22.3-31.1 mozilla-nss-sysinit-debuginfo-32bit-3.22.3-31.1 References: https://www.suse.com/security/cve/CVE-2016-2804.html https://www.suse.com/security/cve/CVE-2016-2806.html https://www.suse.com/security/cve/CVE-2016-2807.html https://www.suse.com/security/cve/CVE-2016-2808.html https://www.suse.com/security/cve/CVE-2016-2811.html https://www.suse.com/security/cve/CVE-2016-2812.html https://www.suse.com/security/cve/CVE-2016-2814.html https://www.suse.com/security/cve/CVE-2016-2816.html https://www.suse.com/security/cve/CVE-2016-2817.html https://www.suse.com/security/cve/CVE-2016-2820.html https://bugzilla.suse.com/977333 https://bugzilla.suse.com/977373 https://bugzilla.suse.com/977375 https://bugzilla.suse.com/977376 https://bugzilla.suse.com/977379 https://bugzilla.suse.com/977381 https://bugzilla.suse.com/977382 https://bugzilla.suse.com/977384 https://bugzilla.suse.com/977386 https://bugzilla.suse.com/977388 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org