[security-announce] SUSE-SU-2014:0824-2: important: Security update for MozillaFirefox
SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0824-2 Rating: important References: #881874 Cross-References: CVE-2014-1533 CVE-2014-1534 CVE-2014-1536 CVE-2014-1537 CVE-2014-1538 CVE-2014-1541 CVE-2014-1545 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. It includes four new package versions. Description: MozillaFirefox was updated to version 24.6.0 to fix six security issues: * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534) * Use-after-free and out of bounds issues found using Address Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538) * Use-after-free with SMIL Animation Controller. (CVE-2014-1541) mozilla-nspr was updated to version 4.10.6 to fix one security issue: * Out of bounds write in NSPR. (CVE-2014-1545) Further information can be found at https://www.mozilla.org/security/announce/ <https://www.mozilla.org/security/announce/> . Security Issues references: * CVE-2014-1533 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533> * CVE-2014-1534 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534> * CVE-2014-1536 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536> * CVE-2014-1537 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537> * CVE-2014-1538 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538> * CVE-2014-1541 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541> * CVE-2014-1545 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545> Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-Firefox-2014-06-9371 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 24,24.6.0esr,3.16.1 and 4.10.6]: MozillaFirefox-24.6.0esr-0.3.1 MozillaFirefox-branding-SLED-24-0.4.10.24 MozillaFirefox-translations-24.6.0esr-0.3.1 libfreebl3-3.16.1-0.3.1 mozilla-nspr-4.10.6-0.3.1 mozilla-nss-3.16.1-0.3.1 mozilla-nss-tools-3.16.1-0.3.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 3.16.1 and 4.10.6]: libfreebl3-32bit-3.16.1-0.3.1 mozilla-nspr-32bit-4.10.6-0.3.1 mozilla-nss-32bit-3.16.1-0.3.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 3.16.1 and 4.10.6]: mozilla-nspr-4.10.6-0.5.1 mozilla-nspr-devel-4.10.6-0.5.1 mozilla-nss-3.16.1-0.5.1 mozilla-nss-devel-3.16.1-0.5.1 mozilla-nss-tools-3.16.1-0.5.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 3.16.1 and 4.10.6]: mozilla-nspr-32bit-4.10.6-0.5.1 mozilla-nss-32bit-3.16.1-0.5.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x) [New Version: 24]: MozillaFirefox-24.6.0esr-0.5.2 MozillaFirefox-branding-SLED-24-0.12.1 MozillaFirefox-translations-24.6.0esr-0.5.2 References: http://support.novell.com/security/cve/CVE-2014-1533.html http://support.novell.com/security/cve/CVE-2014-1534.html http://support.novell.com/security/cve/CVE-2014-1536.html http://support.novell.com/security/cve/CVE-2014-1537.html http://support.novell.com/security/cve/CVE-2014-1538.html http://support.novell.com/security/cve/CVE-2014-1541.html http://support.novell.com/security/cve/CVE-2014-1545.html https://bugzilla.novell.com/881874 http://download.suse.com/patch/finder/?keywords=e2a57d92d922ffebb85c807219cf... http://download.suse.com/patch/finder/?keywords=f0a739569a9d79d0a6467c5ca4d7... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org