SUSE-SU-2013:1325-1: important: Security update for Mozilla Firefox
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Aug 13 16:04:12 MDT 2013
SUSE Security Update: Security update for Mozilla Firefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1325-1
Rating: important
References: #833389
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________
An update that contains security fixes can now be
installed. It includes one version update.
Description:
This update to Firefox 17.0.8esr (bnc#833389) addresses:
* MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 (bmo#855331,
bmo#844088, bmo#858060, bmo#870200, bmo#874974, bmo#861530,
bmo#854157, bmo#893684, bmo#878703, bmo#862185, bmo#879139,
bmo#888107, bmo#880734)
Miscellaneous memory safety hazards have been fixed
(rv:23.0 / rv:17.0.8):
* MFSA 2013-66/CVE-2013-1706/CVE-2013-1707 (bmo#888314,
bmo#888361) Buffer overflow in Mozilla Maintenance Service
and Mozilla Updater
* MFSA 2013-68/CVE-2013-1709 (bmo#848253) Document URI
misrepresentation and masquerading
* MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests
allow for code execution and XSS attacks
* MFSA 2013-71/CVE-2013-1712 (bmo#859072) Further
Privilege escalation through Mozilla Updater
* MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong
principal used for validating URI for some Javascript
components
* MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin
bypass with web workers and XMLHttpRequest
* MFSA 2013-75/CVE-2013-1717 (bmo#406541) Local Java
applets may read contents of local file system
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-MozillaFirefox-8191
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-MozillaFirefox-8191
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-MozillaFirefox-8191
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-MozillaFirefox-8187
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-MozillaFirefox-8187
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-MozillaFirefox-8191
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-MozillaFirefox-8187
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-devel-17.0.8esr-0.7.2
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 17.0.8esr]:
MozillaFirefox-17.0.8esr-0.7.2
MozillaFirefox-translations-17.0.8esr-0.7.2
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 17.0.8esr]:
MozillaFirefox-17.0.8esr-0.7.2
MozillaFirefox-translations-17.0.8esr-0.7.2
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 17.0.8esr]:
MozillaFirefox-17.0.8esr-0.4.2.1
MozillaFirefox-translations-17.0.8esr-0.4.2.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 17.0.8esr]:
MozillaFirefox-17.0.8esr-0.4.2.1
MozillaFirefox-translations-17.0.8esr-0.4.2.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 17.0.8esr]:
MozillaFirefox-17.0.8esr-0.7.2
MozillaFirefox-translations-17.0.8esr-0.7.2
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 17.0.8esr]:
MozillaFirefox-17.0.8esr-0.4.2.1
MozillaFirefox-translations-17.0.8esr-0.4.2.1
References:
https://bugzilla.novell.com/833389
http://download.novell.com/patch/finder/?keywords=0cfcf5031e62c63bd502567283c781f9
http://download.novell.com/patch/finder/?keywords=5d16f58a1649e09775bbc460079ceeda
More information about the sle-security-updates
mailing list