openSUSE-SU-2016:1251-1: moderate: Security update to Firefox 46.0
openSUSE Security Update: Security update to Firefox 46.0 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1251-1 Rating: moderate References: #977333 #977373 #977375 #977376 #977377 #977378 #977379 #977380 #977381 #977382 #977384 #977386 #977388 Cross-References: CVE-2016-2804 CVE-2016-2806 CVE-2016-2807 CVE-2016-2808 CVE-2016-2809 CVE-2016-2810 CVE-2016-2811 CVE-2016-2812 CVE-2016-2813 CVE-2016-2814 CVE-2016-2816 CVE-2016-2817 CVE-2016-2820 Affected Products: openSUSE 13.1 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: This update to Mozilla Firefox 46.0 fixes several security issues and bugs (boo#977333). The following vulnerabilities were fixed: - CVE-2016-2804: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977373) - CVE-2016-2806: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977375) - CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977376) - CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (boo#977386) - CVE-2016-2811: Use-after-free in Service Worker - MFSA 2016-42 (boo#977379) - CVE-2016-2812: Buffer overflow in Service Worker - MFSA 2016-42 (boo#977379) - CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (boo#977381) - CVE-2016-2816: CSP not applied to pages sent with multipart/x-mixed-replace - MFSA 2016-45 (boo#977382) - CVE-2016-2817: Elevation of privilege with chrome.tabs.update API in web extensions - MFSA 2016-46 (boo#977384) - CVE-2016-2820: Firefox Health Reports could accept events from untrusted domains - MFSA 2016-48 (boo#977388) The following miscellaneous changes are included: - Improved security of the JavaScript Just In Time (JIT) Compiler - WebRTC fixes to improve performance and stability - Added support for document.elementsFromPoint - Added HKDF support for Web Crypto API The minimum requirements increased to NSPR 4.12 and NSS 3.22.3. Mozilla NSS was updated to 3.22.3 as a dependency for Mozilla Firefox 46.0, with the following changes: - Increase compatibility of TLS extended master secret, don't send an empty TLS extension last in the handshake (bmo#1243641) - RSA-PSS signatures are now supported - Pseudorandom functions based on hashes other than SHA-1 are now supported - Enforce an External Policy on NSS from a config file Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch 2016-566=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): MozillaFirefox-46.0-113.2 MozillaFirefox-branding-upstream-46.0-113.2 MozillaFirefox-buildsymbols-46.0-113.2 MozillaFirefox-debuginfo-46.0-113.2 MozillaFirefox-debugsource-46.0-113.2 MozillaFirefox-devel-46.0-113.2 MozillaFirefox-translations-common-46.0-113.2 MozillaFirefox-translations-other-46.0-113.2 libfreebl3-3.22.3-77.1 libfreebl3-debuginfo-3.22.3-77.1 libsoftokn3-3.22.3-77.1 libsoftokn3-debuginfo-3.22.3-77.1 mozilla-nss-3.22.3-77.1 mozilla-nss-certs-3.22.3-77.1 mozilla-nss-certs-debuginfo-3.22.3-77.1 mozilla-nss-debuginfo-3.22.3-77.1 mozilla-nss-debugsource-3.22.3-77.1 mozilla-nss-devel-3.22.3-77.1 mozilla-nss-sysinit-3.22.3-77.1 mozilla-nss-sysinit-debuginfo-3.22.3-77.1 mozilla-nss-tools-3.22.3-77.1 mozilla-nss-tools-debuginfo-3.22.3-77.1 - openSUSE 13.1 (x86_64): libfreebl3-32bit-3.22.3-77.1 libfreebl3-debuginfo-32bit-3.22.3-77.1 libsoftokn3-32bit-3.22.3-77.1 libsoftokn3-debuginfo-32bit-3.22.3-77.1 mozilla-nss-32bit-3.22.3-77.1 mozilla-nss-certs-32bit-3.22.3-77.1 mozilla-nss-certs-debuginfo-32bit-3.22.3-77.1 mozilla-nss-debuginfo-32bit-3.22.3-77.1 mozilla-nss-sysinit-32bit-3.22.3-77.1 mozilla-nss-sysinit-debuginfo-32bit-3.22.3-77.1 References: https://www.suse.com/security/cve/CVE-2016-2804.html https://www.suse.com/security/cve/CVE-2016-2806.html https://www.suse.com/security/cve/CVE-2016-2807.html https://www.suse.com/security/cve/CVE-2016-2808.html https://www.suse.com/security/cve/CVE-2016-2809.html https://www.suse.com/security/cve/CVE-2016-2810.html https://www.suse.com/security/cve/CVE-2016-2811.html https://www.suse.com/security/cve/CVE-2016-2812.html https://www.suse.com/security/cve/CVE-2016-2813.html https://www.suse.com/security/cve/CVE-2016-2814.html https://www.suse.com/security/cve/CVE-2016-2816.html https://www.suse.com/security/cve/CVE-2016-2817.html https://www.suse.com/security/cve/CVE-2016-2820.html https://bugzilla.suse.com/977333 https://bugzilla.suse.com/977373 https://bugzilla.suse.com/977375 https://bugzilla.suse.com/977376 https://bugzilla.suse.com/977377 https://bugzilla.suse.com/977378 https://bugzilla.suse.com/977379 https://bugzilla.suse.com/977380 https://bugzilla.suse.com/977381 https://bugzilla.suse.com/977382 https://bugzilla.suse.com/977384 https://bugzilla.suse.com/977386 https://bugzilla.suse.com/977388
participants (1)
-
opensuse-security@opensuse.org