SUSE-SU-2014:0665-1: important: Security update for Mozilla Firefox

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu May 15 18:05:04 MDT 2014


   SUSE Security Update: Security update for Mozilla Firefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0665-1
Rating:             important
References:         #865539 #869827 #875378 
Cross-References:   CVE-2014-1492 CVE-2014-1518 CVE-2014-1523
                    CVE-2014-1524 CVE-2014-1529 CVE-2014-1530
                    CVE-2014-1531 CVE-2014-1532
Affected Products:
                    SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available. It
   includes four new package versions.

Description:


   This Mozilla Firefox and Mozilla NSS update fixes several security and
   non-security issues.

   Mozilla Firefox has been updated to 24.5.0esr which fixes the following
   issues:

   * MFSA 2014-34/CVE-2014-1518 Miscellaneous memory safety hazards
   * MFSA 2014-37/CVE-2014-1523 Out of bounds read while decoding JPG
   images
   * MFSA 2014-38/CVE-2014-1524 Buffer overflow when using non-XBL object
   as XBL
   * MFSA 2014-42/CVE-2014-1529 Privilege escalation through Web
   Notification API
   * MFSA 2014-43/CVE-2014-1530 Cross-site scripting (XSS) using history
   navigations
   * MFSA 2014-44/CVE-2014-1531 Use-after-free in imgLoader while
   resizing images
   * MFSA 2014-46/CVE-2014-1532 Use-after-free in nsHostResolver

   Mozilla NSS has been updated to 3.16

   * required for Firefox 29
   * CVE-2014-1492_ In a wildcard certificate, the wildcard character
   should not be embedded within the U-label of an internationalized
   domain name. See the last bullet point in RFC 6125, Section 7.2.
   * Update of root certificates.

   Security Issue references:

   * CVE-2014-1532
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532>
   * CVE-2014-1531
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531>
   * CVE-2014-1530
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530>
   * CVE-2014-1529
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529>
   * CVE-2014-1524
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524>
   * CVE-2014-1523
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523>
   * CVE-2014-1518
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518>
   * CVE-2014-1492
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-MozillaFirefox-201404-9187

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 24,24.5.0esr,3.16 and 4.10.4]:

      MozillaFirefox-24.5.0esr-0.3.1
      MozillaFirefox-branding-SLED-24-0.4.10.14
      MozillaFirefox-translations-24.5.0esr-0.3.1
      libfreebl3-3.16-0.3.1
      mozilla-nspr-4.10.4-0.3.1
      mozilla-nss-3.16-0.3.1
      mozilla-nss-tools-3.16-0.3.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 3.16 and 4.10.4]:

      libfreebl3-32bit-3.16-0.3.1
      mozilla-nspr-32bit-4.10.4-0.3.1
      mozilla-nss-32bit-3.16-0.3.1


References:

   http://support.novell.com/security/cve/CVE-2014-1492.html
   http://support.novell.com/security/cve/CVE-2014-1518.html
   http://support.novell.com/security/cve/CVE-2014-1523.html
   http://support.novell.com/security/cve/CVE-2014-1524.html
   http://support.novell.com/security/cve/CVE-2014-1529.html
   http://support.novell.com/security/cve/CVE-2014-1530.html
   http://support.novell.com/security/cve/CVE-2014-1531.html
   http://support.novell.com/security/cve/CVE-2014-1532.html
   https://bugzilla.novell.com/865539
   https://bugzilla.novell.com/869827
   https://bugzilla.novell.com/875378
   http://download.suse.com/patch/finder/?keywords=02d70d3c9e25d9db60e36b3f80b0bc27



More information about the sle-updates mailing list