SUSE-SU-2013:1497-1: important: Security update for Mozilla Firefox

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Sep 27 14:04:10 MDT 2013


   SUSE Security Update: Security update for Mozilla Firefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1497-1
Rating:             important
References:         #840485 
Cross-References:   CVE-2013-1705 CVE-2013-1718 CVE-2013-1722
                    CVE-2013-1725 CVE-2013-1726 CVE-2013-1730
                    CVE-2013-1732 CVE-2013-1735 CVE-2013-1736
                    CVE-2013-1737
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that fixes 10 vulnerabilities is now available.
   It includes one version update.

Description:


   This update to Firefox 17.0.9esr (bnc#840485) addresses:

   * MFSA 2013-91 User-defined properties on DOM proxies
   get the wrong "this" object o (CVE-2013-1737)
   * MFSA 2013-90 Memory corruption involving scrolling o
   use-after-free in mozilla::layout::ScrollbarActivity
   (CVE-2013-1735) o Memory corruption in
   nsGfxScrollFrameInner::IsLTR() (CVE-2013-1736)
   * MFSA 2013-89 Buffer overflow with multi-column,
   lists, and floats o buffer overflow at
   nsFloatManager::GetFlowArea() with multicol, list, floats
   (CVE-2013-1732)
   * MFSA 2013-88 compartment mismatch re-attaching
   XBL-backed nodes o compartment mismatch in
   nsXBLBinding::DoInitJSClass (CVE-2013-1730)
   * MFSA 2013-83 Mozilla Updater does not lock MAR file
   after signature verification o MAR signature bypass in
   Updater could lead to downgrade (CVE-2013-1726)
   * MFSA 2013-82 Calling scope for new Javascript objects
   can lead to memory corruption o ABORT: bad scope for new
   JSObjects: ReparentWrapper / document.open (CVE-2013-1725)
   * MFSA 2013-79 Use-after-free in Animation Manager
   during stylesheet cloning o Heap-use-after-free in
   nsAnimationManager::BuildAnimations (CVE-2013-1722)
   * MFSA 2013-76 Miscellaneous memory safety hazards
   (rv:24.0 / rv:17.0.9) o Memory safety bugs fixed in Firefox
   17.0.9 and Firefox 24.0 (CVE-2013-1718)
   * MFSA 2013-65 Buffer underflow when generating CRMF
   requests o ASAN heap-buffer-overflow (read 1) in
   cryptojs_interpret_key_gen_type (CVE-2013-1705)

   Security Issue references:

   * CVE-2013-1737
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
   >
   * CVE-2013-1735
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
   >
   * CVE-2013-1736
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
   >
   * CVE-2013-1732
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
   >
   * CVE-2013-1730
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
   >
   * CVE-2013-1726
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726
   >
   * CVE-2013-1725
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
   >
   * CVE-2013-1722
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
   >
   * CVE-2013-1718
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
   >
   * CVE-2013-1705
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-MozillaFirefox-8344

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-MozillaFirefox-8344

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-MozillaFirefox-8344

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-MozillaFirefox-8346

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-MozillaFirefox-8346

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-MozillaFirefox-8344

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-MozillaFirefox-8346

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      MozillaFirefox-devel-17.0.9esr-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 17.0.9esr]:

      MozillaFirefox-17.0.9esr-0.7.1
      MozillaFirefox-translations-17.0.9esr-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 17.0.9esr]:

      MozillaFirefox-17.0.9esr-0.7.1
      MozillaFirefox-translations-17.0.9esr-0.7.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 17.0.9esr]:

      MozillaFirefox-17.0.9esr-0.3.1
      MozillaFirefox-translations-17.0.9esr-0.3.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 17.0.9esr]:

      MozillaFirefox-17.0.9esr-0.3.1
      MozillaFirefox-translations-17.0.9esr-0.3.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 17.0.9esr]:

      MozillaFirefox-17.0.9esr-0.7.1
      MozillaFirefox-translations-17.0.9esr-0.7.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 17.0.9esr]:

      MozillaFirefox-17.0.9esr-0.3.1
      MozillaFirefox-translations-17.0.9esr-0.3.1


References:

   http://support.novell.com/security/cve/CVE-2013-1705.html
   http://support.novell.com/security/cve/CVE-2013-1718.html
   http://support.novell.com/security/cve/CVE-2013-1722.html
   http://support.novell.com/security/cve/CVE-2013-1725.html
   http://support.novell.com/security/cve/CVE-2013-1726.html
   http://support.novell.com/security/cve/CVE-2013-1730.html
   http://support.novell.com/security/cve/CVE-2013-1732.html
   http://support.novell.com/security/cve/CVE-2013-1735.html
   http://support.novell.com/security/cve/CVE-2013-1736.html
   http://support.novell.com/security/cve/CVE-2013-1737.html
   https://bugzilla.novell.com/840485
   http://download.novell.com/patch/finder/?keywords=4df7bcc5f235f358ce6dcbd142b37d5a
   http://download.novell.com/patch/finder/?keywords=a1902baf1b0df196651ea0bae84e6001



More information about the sle-updates mailing list