Mailinglist Archive: opensuse-updates (133 mails)

< Previous Next >
openSUSE-SU-2016:1251-1: moderate: Security update to Firefox 46.0
openSUSE Security Update: Security update to Firefox 46.0
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:1251-1
Rating: moderate
References: #977333 #977373 #977375 #977376 #977377 #977378
#977379 #977380 #977381 #977382 #977384 #977386
#977388
Cross-References: CVE-2016-2804 CVE-2016-2806 CVE-2016-2807
CVE-2016-2808 CVE-2016-2809 CVE-2016-2810
CVE-2016-2811 CVE-2016-2812 CVE-2016-2813
CVE-2016-2814 CVE-2016-2816 CVE-2016-2817
CVE-2016-2820
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes 13 vulnerabilities is now available.

Description:

This update to Mozilla Firefox 46.0 fixes several security issues and bugs
(boo#977333).

The following vulnerabilities were fixed:

- CVE-2016-2804: Miscellaneous memory safety hazards - MFSA 2016-39
(boo#977373)
- CVE-2016-2806: Miscellaneous memory safety hazards - MFSA 2016-39
(boo#977375)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39
(boo#977376)
- CVE-2016-2808: Write to invalid HashMap entry through
JavaScript.watch()
- MFSA 2016-47 (boo#977386)
- CVE-2016-2811: Use-after-free in Service Worker - MFSA 2016-42
(boo#977379)
- CVE-2016-2812: Buffer overflow in Service Worker - MFSA 2016-42
(boo#977379)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets -
MFSA 2016-44 (boo#977381)
- CVE-2016-2816: CSP not applied to pages sent with
multipart/x-mixed-replace - MFSA 2016-45 (boo#977382)
- CVE-2016-2817: Elevation of privilege with chrome.tabs.update API in
web extensions - MFSA 2016-46 (boo#977384)
- CVE-2016-2820: Firefox Health Reports could accept events from
untrusted domains - MFSA 2016-48 (boo#977388)

The following miscellaneous changes are included:

- Improved security of the JavaScript Just In Time (JIT) Compiler
- WebRTC fixes to improve performance and stability
- Added support for document.elementsFromPoint
- Added HKDF support for Web Crypto API

The minimum requirements increased to NSPR 4.12 and NSS 3.22.3.

Mozilla NSS was updated to 3.22.3 as a dependency for Mozilla Firefox
46.0, with the following changes:

- Increase compatibility of TLS extended master secret, don't send an
empty TLS extension last in the handshake (bmo#1243641)
- RSA-PSS signatures are now supported
- Pseudorandom functions based on hashes other than SHA-1 are now
supported
- Enforce an External Policy on NSS from a config file


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch 2016-566=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

MozillaFirefox-46.0-113.2
MozillaFirefox-branding-upstream-46.0-113.2
MozillaFirefox-buildsymbols-46.0-113.2
MozillaFirefox-debuginfo-46.0-113.2
MozillaFirefox-debugsource-46.0-113.2
MozillaFirefox-devel-46.0-113.2
MozillaFirefox-translations-common-46.0-113.2
MozillaFirefox-translations-other-46.0-113.2
libfreebl3-3.22.3-77.1
libfreebl3-debuginfo-3.22.3-77.1
libsoftokn3-3.22.3-77.1
libsoftokn3-debuginfo-3.22.3-77.1
mozilla-nss-3.22.3-77.1
mozilla-nss-certs-3.22.3-77.1
mozilla-nss-certs-debuginfo-3.22.3-77.1
mozilla-nss-debuginfo-3.22.3-77.1
mozilla-nss-debugsource-3.22.3-77.1
mozilla-nss-devel-3.22.3-77.1
mozilla-nss-sysinit-3.22.3-77.1
mozilla-nss-sysinit-debuginfo-3.22.3-77.1
mozilla-nss-tools-3.22.3-77.1
mozilla-nss-tools-debuginfo-3.22.3-77.1

- openSUSE 13.1 (x86_64):

libfreebl3-32bit-3.22.3-77.1
libfreebl3-debuginfo-32bit-3.22.3-77.1
libsoftokn3-32bit-3.22.3-77.1
libsoftokn3-debuginfo-32bit-3.22.3-77.1
mozilla-nss-32bit-3.22.3-77.1
mozilla-nss-certs-32bit-3.22.3-77.1
mozilla-nss-certs-debuginfo-32bit-3.22.3-77.1
mozilla-nss-debuginfo-32bit-3.22.3-77.1
mozilla-nss-sysinit-32bit-3.22.3-77.1
mozilla-nss-sysinit-debuginfo-32bit-3.22.3-77.1


References:

https://www.suse.com/security/cve/CVE-2016-2804.html
https://www.suse.com/security/cve/CVE-2016-2806.html
https://www.suse.com/security/cve/CVE-2016-2807.html
https://www.suse.com/security/cve/CVE-2016-2808.html
https://www.suse.com/security/cve/CVE-2016-2809.html
https://www.suse.com/security/cve/CVE-2016-2810.html
https://www.suse.com/security/cve/CVE-2016-2811.html
https://www.suse.com/security/cve/CVE-2016-2812.html
https://www.suse.com/security/cve/CVE-2016-2813.html
https://www.suse.com/security/cve/CVE-2016-2814.html
https://www.suse.com/security/cve/CVE-2016-2816.html
https://www.suse.com/security/cve/CVE-2016-2817.html
https://www.suse.com/security/cve/CVE-2016-2820.html
https://bugzilla.suse.com/977333
https://bugzilla.suse.com/977373
https://bugzilla.suse.com/977375
https://bugzilla.suse.com/977376
https://bugzilla.suse.com/977377
https://bugzilla.suse.com/977378
https://bugzilla.suse.com/977379
https://bugzilla.suse.com/977380
https://bugzilla.suse.com/977381
https://bugzilla.suse.com/977382
https://bugzilla.suse.com/977384
https://bugzilla.suse.com/977386
https://bugzilla.suse.com/977388


< Previous Next >
This Thread
  • No further messages