Security update for MozillaFirefox, mozilla-nspr, mozilla-nss
Announcement ID: | SUSE-SU-2015:1269-1 |
Rating: | important |
References: | #856315 #935033 #935979 |
Affected Products: |
An update that fixes 17 vulnerabilities is now available.
Description:
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17
security issues.
For more details please check the changelogs.
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety
hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some
signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using
XMLHttpRequest (bsc#935979).
-
CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2
015-2739/CVE-2015-2740: Vulnerabilities found through code inspection
(bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE
cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange
(bsc#935979).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-330=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-330=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-330=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
- MozillaFirefox-debuginfo-31.8.0esr-37.3
- MozillaFirefox-debugsource-31.8.0esr-37.3
- MozillaFirefox-devel-31.8.0esr-37.3
- mozilla-nspr-debuginfo-4.10.8-3.1
- mozilla-nspr-debugsource-4.10.8-3.1
- mozilla-nspr-devel-4.10.8-3.1
- mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1
- mozilla-nss-devel-3.19.2_CKBI_1.98-21.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
- MozillaFirefox-31.8.0esr-37.3
- MozillaFirefox-debuginfo-31.8.0esr-37.3
- MozillaFirefox-debugsource-31.8.0esr-37.3
- MozillaFirefox-translations-31.8.0esr-37.3
- libfreebl3-3.19.2_CKBI_1.98-21.1
- libfreebl3-debuginfo-3.19.2_CKBI_1.98-21.1
- libfreebl3-hmac-3.19.2_CKBI_1.98-21.1
- libsoftokn3-3.19.2_CKBI_1.98-21.1
- libsoftokn3-debuginfo-3.19.2_CKBI_1.98-21.1
- libsoftokn3-hmac-3.19.2_CKBI_1.98-21.1
- mozilla-nspr-4.10.8-3.1
- mozilla-nspr-debuginfo-4.10.8-3.1
- mozilla-nspr-debugsource-4.10.8-3.1
- mozilla-nss-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-debuginfo-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1
- mozilla-nss-tools-3.19.2_CKBI_1.98-21.1
- mozilla-nss-tools-debuginfo-3.19.2_CKBI_1.98-21.1
- SUSE Linux Enterprise Server 12 (s390x x86_64):
- libfreebl3-32bit-3.19.2_CKBI_1.98-21.1
- libfreebl3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- libfreebl3-hmac-32bit-3.19.2_CKBI_1.98-21.1
- libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1
- libsoftokn3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- libsoftokn3-hmac-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nspr-32bit-4.10.8-3.1
- mozilla-nspr-debuginfo-32bit-4.10.8-3.1
- mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
- MozillaFirefox-31.8.0esr-37.3
- MozillaFirefox-debuginfo-31.8.0esr-37.3
- MozillaFirefox-debugsource-31.8.0esr-37.3
- MozillaFirefox-translations-31.8.0esr-37.3
- libfreebl3-3.19.2_CKBI_1.98-21.1
- libfreebl3-32bit-3.19.2_CKBI_1.98-21.1
- libfreebl3-debuginfo-3.19.2_CKBI_1.98-21.1
- libfreebl3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- libsoftokn3-3.19.2_CKBI_1.98-21.1
- libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1
- libsoftokn3-debuginfo-3.19.2_CKBI_1.98-21.1
- libsoftokn3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nspr-32bit-4.10.8-3.1
- mozilla-nspr-4.10.8-3.1
- mozilla-nspr-debuginfo-32bit-4.10.8-3.1
- mozilla-nspr-debuginfo-4.10.8-3.1
- mozilla-nspr-debugsource-4.10.8-3.1
- mozilla-nss-3.19.2_CKBI_1.98-21.1
- mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-debuginfo-3.19.2_CKBI_1.98-21.1
- mozilla-nss-certs-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
- mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1
- mozilla-nss-tools-3.19.2_CKBI_1.98-21.1
- mozilla-nss-tools-debuginfo-3.19.2_CKBI_1.98-21.1
References:
- https://www.suse.com/security/cve/CVE-2015-2721.html
- https://www.suse.com/security/cve/CVE-2015-2722.html
- https://www.suse.com/security/cve/CVE-2015-2724.html
- https://www.suse.com/security/cve/CVE-2015-2725.html
- https://www.suse.com/security/cve/CVE-2015-2726.html
- https://www.suse.com/security/cve/CVE-2015-2728.html
- https://www.suse.com/security/cve/CVE-2015-2730.html
- https://www.suse.com/security/cve/CVE-2015-2733.html
- https://www.suse.com/security/cve/CVE-2015-2734.html
- https://www.suse.com/security/cve/CVE-2015-2735.html
- https://www.suse.com/security/cve/CVE-2015-2736.html
- https://www.suse.com/security/cve/CVE-2015-2737.html
- https://www.suse.com/security/cve/CVE-2015-2738.html
- https://www.suse.com/security/cve/CVE-2015-2739.html
- https://www.suse.com/security/cve/CVE-2015-2740.html
- https://www.suse.com/security/cve/CVE-2015-2743.html
- https://www.suse.com/security/cve/CVE-2015-4000.html
- https://bugzilla.suse.com/856315
- https://bugzilla.suse.com/935033
- https://bugzilla.suse.com/935979