Mailinglist Archive: opensuse-updates (46 mails)

< Previous Next >
openSUSE-SU-2014:0939-1: important: MozillaFirefox: Update to Mozilla Firefox 31
openSUSE Security Update: MozillaFirefox: Update to Mozilla Firefox 31
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0939-1
Rating: important
References: #887746
Cross-References: CVE-2014-1544 CVE-2014-1547 CVE-2014-1548
CVE-2014-1549 CVE-2014-1550 CVE-2014-1552
CVE-2014-1555 CVE-2014-1556 CVE-2014-1557
CVE-2014-1558 CVE-2014-1559 CVE-2014-1560
CVE-2014-1561
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________

An update that fixes 13 vulnerabilities is now available.

Description:


MozillaFirefox was updated to version 31 to fix various security issues
and bugs:

* MFSA 2014-56/CVE-2014-1547/CVE-2014-1548 Miscellaneous memory safety
hazards
* MFSA 2014-57/CVE-2014-1549 (bmo#1020205) Buffer overflow during Web
Audio buffering for playback
* MFSA 2014-58/CVE-2014-1550 (bmo#1020411) Use-after-free in Web Audio due
to incorrect control message ordering
* MFSA 2014-60/CVE-2014-1561 (bmo#1000514, bmo#910375) Toolbar dialog
customization event spoofing
* MFSA 2014-61/CVE-2014-1555 (bmo#1023121) Use-after-free with
FireOnStateChange event
* MFSA 2014-62/CVE-2014-1556 (bmo#1028891) Exploitable WebGL crash with
Cesium JavaScript library
* MFSA 2014-63/CVE-2014-1544 (bmo#963150) Use-after-free while when
manipulating certificates in the trusted cache (solved with NSS 3.16.2
requirement)
* MFSA 2014-64/CVE-2014-1557 (bmo#913805) Crash in Skia library when
scaling high quality images
* MFSA 2014-65/CVE-2014-1558/CVE-2014-1559/CVE-2014-1560 (bmo#1015973,
bmo#1026022, bmo#997795) Certificate parsing broken by non-standard
character encoding
* MFSA 2014-66/CVE-2014-1552 (bmo#985135) IFRAME sandbox same-origin
access through redirect

Mozilla-nss was updated to 3.16.3: New Functions:
* CERT_GetGeneralNameTypeFromString (This function was already added in
NSS 3.16.2, however, it wasn't declared in a public header file.)
Notable Changes:
* The following 1024-bit CA certificates were removed
- Entrust.net Secure Server Certification Authority
- GTE CyberTrust Global Root
- ValiCert Class 1 Policy Validation Authority
- ValiCert Class 2 Policy Validation Authority
- ValiCert Class 3 Policy Validation Authority
* Additionally, the following CA certificate was removed as requested by
the CA:
- TDC Internet Root CA
* The following CA certificates were added:
- Certification Authority of WoSign
- CA 沃通根证书
- DigiCert Assured ID Root G2
- DigiCert Assured ID Root G3
- DigiCert Global Root G2
- DigiCert Global Root G3
- DigiCert Trusted Root G4
- QuoVadis Root CA 1 G3
- QuoVadis Root CA 2 G3
- QuoVadis Root CA 3 G3
* The Trust Bits were changed for the following CA certificates
- Class 3 Public Primary Certification Authority
- Class 3 Public Primary Certification Authority
- Class 2 Public Primary Certification Authority - G2
- VeriSign Class 2 Public Primary Certification Authority - G3
- AC Raíz Certicámara S.A.
- NetLock Uzleti (Class B) Tanusitvanykiado
- NetLock Expressz (Class C) Tanusitvanykiado changes in 3.16.2 New
functionality:
* DTLS 1.2 is supported.
* The TLS application layer protocol negotiation (ALPN) extension is also
supported on the server side.
* RSA-OEAP is supported. Use the new PK11_PrivDecrypt and PK11_PubEncrypt
functions with the CKM_RSA_PKCS_OAEP mechanism.
* New Intel AES assembly code for 32-bit and 64-bit Windows, contributed
by Shay Gueron and Vlad Krasnov of Intel. Notable Changes:
* The btoa command has a new command-line option -w suffix, which causes
the output to be wrapped in BEGIN/END lines with the given suffix
* The certutil commands supports additionals types of subject alt name
extensions.
* The certutil command supports generic certificate extensions, by loading
binary data from files, which have been prepared using external tools,
or which have been extracted from other existing certificates and dumped
to file.
* The certutil command supports three new certificate usage specifiers.
* The pp command supports printing UTF-8 (-u).
* On Linux, NSS is built with the -ffunction-sections -fdata-sections
compiler flags and the --gc-sections linker flag to allow unused
functions to be discarded. changes in 3.16.1 New functionality:
* Added the "ECC" flag for modutil to select the module used for elliptic
curve cryptography (ECC) operations. New Macros
* PUBLIC_MECH_ECC_FLAG a public mechanism flag for elliptic curve
cryptography (ECC)
operations
* SECMOD_ECC_FLAG an NSS-internal mechanism flag for elliptic curve
cryptography (ECC) operations. This macro has the same numeric value as
PUBLIC_MECH_ECC_FLAG. Notable Changes:
* Imposed name constraints on the French government root CA ANSSI (DCISS).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-

- openSUSE 12.3:

zypper in -t patch openSUSE-2014-

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

MozillaFirefox-31.0-33.1
MozillaFirefox-branding-upstream-31.0-33.1
MozillaFirefox-buildsymbols-31.0-33.1
MozillaFirefox-debuginfo-31.0-33.1
MozillaFirefox-debugsource-31.0-33.1
MozillaFirefox-devel-31.0-33.1
MozillaFirefox-translations-common-31.0-33.1
MozillaFirefox-translations-other-31.0-33.1
libfreebl3-3.16.3-27.1
libfreebl3-debuginfo-3.16.3-27.1
libsoftokn3-3.16.3-27.1
libsoftokn3-debuginfo-3.16.3-27.1
mozilla-nss-3.16.3-27.1
mozilla-nss-certs-3.16.3-27.1
mozilla-nss-certs-debuginfo-3.16.3-27.1
mozilla-nss-debuginfo-3.16.3-27.1
mozilla-nss-debugsource-3.16.3-27.1
mozilla-nss-devel-3.16.3-27.1
mozilla-nss-sysinit-3.16.3-27.1
mozilla-nss-sysinit-debuginfo-3.16.3-27.1
mozilla-nss-tools-3.16.3-27.1
mozilla-nss-tools-debuginfo-3.16.3-27.1

- openSUSE 13.1 (x86_64):

libfreebl3-32bit-3.16.3-27.1
libfreebl3-debuginfo-32bit-3.16.3-27.1
libsoftokn3-32bit-3.16.3-27.1
libsoftokn3-debuginfo-32bit-3.16.3-27.1
mozilla-nss-32bit-3.16.3-27.1
mozilla-nss-certs-32bit-3.16.3-27.1
mozilla-nss-certs-debuginfo-32bit-3.16.3-27.1
mozilla-nss-debuginfo-32bit-3.16.3-27.1
mozilla-nss-sysinit-32bit-3.16.3-27.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.3-27.1

- openSUSE 12.3 (i586 x86_64):

MozillaFirefox-31.0-1.72.1
MozillaFirefox-branding-upstream-31.0-1.72.1
MozillaFirefox-buildsymbols-31.0-1.72.1
MozillaFirefox-debuginfo-31.0-1.72.1
MozillaFirefox-debugsource-31.0-1.72.1
MozillaFirefox-devel-31.0-1.72.1
MozillaFirefox-translations-common-31.0-1.72.1
MozillaFirefox-translations-other-31.0-1.72.1
libfreebl3-3.16.3-1.43.1
libfreebl3-debuginfo-3.16.3-1.43.1
libsoftokn3-3.16.3-1.43.1
libsoftokn3-debuginfo-3.16.3-1.43.1
mozilla-nss-3.16.3-1.43.1
mozilla-nss-certs-3.16.3-1.43.1
mozilla-nss-certs-debuginfo-3.16.3-1.43.1
mozilla-nss-debuginfo-3.16.3-1.43.1
mozilla-nss-debugsource-3.16.3-1.43.1
mozilla-nss-devel-3.16.3-1.43.1
mozilla-nss-sysinit-3.16.3-1.43.1
mozilla-nss-sysinit-debuginfo-3.16.3-1.43.1
mozilla-nss-tools-3.16.3-1.43.1
mozilla-nss-tools-debuginfo-3.16.3-1.43.1

- openSUSE 12.3 (x86_64):

libfreebl3-32bit-3.16.3-1.43.1
libfreebl3-debuginfo-32bit-3.16.3-1.43.1
libsoftokn3-32bit-3.16.3-1.43.1
libsoftokn3-debuginfo-32bit-3.16.3-1.43.1
mozilla-nss-32bit-3.16.3-1.43.1
mozilla-nss-certs-32bit-3.16.3-1.43.1
mozilla-nss-certs-debuginfo-32bit-3.16.3-1.43.1
mozilla-nss-debuginfo-32bit-3.16.3-1.43.1
mozilla-nss-sysinit-32bit-3.16.3-1.43.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.3-1.43.1


References:

http://support.novell.com/security/cve/CVE-2014-1544.html
http://support.novell.com/security/cve/CVE-2014-1547.html
http://support.novell.com/security/cve/CVE-2014-1548.html
http://support.novell.com/security/cve/CVE-2014-1549.html
http://support.novell.com/security/cve/CVE-2014-1550.html
http://support.novell.com/security/cve/CVE-2014-1552.html
http://support.novell.com/security/cve/CVE-2014-1555.html
http://support.novell.com/security/cve/CVE-2014-1556.html
http://support.novell.com/security/cve/CVE-2014-1557.html
http://support.novell.com/security/cve/CVE-2014-1558.html
http://support.novell.com/security/cve/CVE-2014-1559.html
http://support.novell.com/security/cve/CVE-2014-1560.html
http://support.novell.com/security/cve/CVE-2014-1561.html
https://bugzilla.novell.com/887746


< Previous Next >
This Thread
  • No further messages