Security update for MozillaFirefox
Announcement ID: | SUSE-SU-2016:3223-1 |
Rating: | important |
References: | #1000751 #1015422 |
Affected Products: |
An update that fixes 10 vulnerabilities is now available.
Description:
MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:
* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized
before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating
DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events
and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded
by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and
Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the
origin of events
Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-MozillaFirefox-12907=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-MozillaFirefox-12907=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
- MozillaFirefox-45.6.0esr-66.1
- MozillaFirefox-translations-45.6.0esr-66.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):
- MozillaFirefox-debuginfo-45.6.0esr-66.1
- MozillaFirefox-debugsource-45.6.0esr-66.1
References:
- https://www.suse.com/security/cve/CVE-2016-9893.html
- https://www.suse.com/security/cve/CVE-2016-9895.html
- https://www.suse.com/security/cve/CVE-2016-9897.html
- https://www.suse.com/security/cve/CVE-2016-9898.html
- https://www.suse.com/security/cve/CVE-2016-9899.html
- https://www.suse.com/security/cve/CVE-2016-9900.html
- https://www.suse.com/security/cve/CVE-2016-9901.html
- https://www.suse.com/security/cve/CVE-2016-9902.html
- https://www.suse.com/security/cve/CVE-2016-9904.html
- https://www.suse.com/security/cve/CVE-2016-9905.html
- https://bugzilla.suse.com/1000751
- https://bugzilla.suse.com/1015422