You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mozilla firefox

Sigurnosni nedostaci programskog paketa mozilla firefox

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID: SUSE-SU-2014:1112-1
Rating: important
References: #894370
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
______________________________________________________________________________

An update that contains security fixes can now be
installed. It includes three new package versions.

Description:

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox
24ESR codestream:

* MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
reported, via TippingPoint’s Zero Day Initiative, a use-after-free
during text layout when interacting with the setting of text
direction. This results in a use-after-free which can lead to
arbitrary code execution.
* MFSA 2014-67: Mozilla developers and community identified and fixed
several memory safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed evidence of
memory corruption under certain circumstances, and we presume that with
enough effort at least some of these could be exploited to run arbitrary
code.
* Jan de Mooij reported a memory safety problem that affects Firefox
ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on:
https://www.mozilla.org/security/announce/
<https://www.mozilla.org/security/announce/> .

Security Issues:

* CVE-2014-1562
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562>
* CVE-2014-1567
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567>

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11 SP2 LTSS:

zypper in -t patch slessp2-firefox-201409-9682

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 24.8.0esr,3.16.4 and 4.10.7]:

MozillaFirefox-24.8.0esr-0.3.1
MozillaFirefox-translations-24.8.0esr-0.3.1
libfreebl3-3.16.4-0.3.1
mozilla-nspr-4.10.7-0.3.1
mozilla-nspr-devel-4.10.7-0.3.1
mozilla-nss-3.16.4-0.3.1
mozilla-nss-devel-3.16.4-0.3.1
mozilla-nss-tools-3.16.4-0.3.1

– SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

libfreebl3-32bit-3.16.4-0.3.1
mozilla-nspr-32bit-4.10.7-0.3.1
mozilla-nss-32bit-3.16.4-0.3.1

References:

https://bugzilla.novell.com/894370
http://download.suse.com/patch/finder/?keywords=e1c935e0f16e49f1e16fa6831a476bb8


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1120-1
Rating:             important
References:         #882881 #894370
Cross-References:   CVE-2014-1562 CVE-2014-1567
Affected Products:
                    SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.
   It includes two new package versions.

Description:

   Mozilla Firefox was updated to the 24.8.0ESR release, fixing security
   issues and bugs.

   Only some of the published security advisories affect the Mozilla Firefox
   24ESR codestream:

       * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
         reported, via TippingPoint’s Zero Day Initiative, a use-after-free
         during text layout when interacting with the setting of text
         direction. This results in a use-after-free which can lead to
         arbitrary code execution.
       * MFSA 2014-67: Mozilla developers and community identified and fixed
         several memory safety bugs in the browser engine used in Firefox and
         other Mozilla-based products. Some of these bugs showed evidence of
   memory corruption under certain circumstances, and we presume that with
   enough effort at least some of these could be exploited to run arbitrary
   code.
       * Jan de Mooij reported a memory safety problem that affects Firefox
         ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

   More information is referenced on:
   https://www.mozilla.org/security/announce/
   <https://www.mozilla.org/security/announce/> .

   Security Issues:

       * CVE-2014-1567
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567>
       * CVE-2014-1562
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562>

Package List:

   – SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

      firefox-gtk2-2.18.9-0.11.1
      firefox-gtk2-lang-2.18.9-0.11.1
      mozilla-nspr-4.10.7-0.5.1
      mozilla-nspr-devel-4.10.7-0.5.1
      mozilla-nss-3.16.4-0.5.2
      mozilla-nss-devel-3.16.4-0.5.2
      mozilla-nss-tools-3.16.4-0.5.2

   – SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

      firefox-gtk2-32bit-2.18.9-0.11.1
      mozilla-nspr-32bit-4.10.7-0.5.1
      mozilla-nss-32bit-3.16.4-0.5.2

   – SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x):

      MozillaFirefox-24.8.0esr-0.5.1
      MozillaFirefox-translations-24.8.0esr-0.5.1

References:

   http://support.novell.com/security/cve/CVE-2014-1562.html
   http://support.novell.com/security/cve/CVE-2014-1567.html
   https://bugzilla.novell.com/882881
   https://bugzilla.novell.com/894370
   http://download.suse.com/patch/finder/?keywords=401ac4583a90138bdc8c41d347a7be85


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

   SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1120-2
Rating:             important
References:         #882881 #894370
Cross-References:   CVE-2014-1562 CVE-2014-1567
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.
   It includes two new package versions.

Description:

   Mozilla Firefox was updated to the 24.8.0ESR release, fixing security
   issues and bugs.

   Only some of the published security advisories affect the Mozilla Firefox
   24ESR codestream:

       * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
         reported, via TippingPoint’s Zero Day Initiative, a use-after-free
         during text layout when interacting with the setting of text
         direction. This results in a use-after-free which can lead to
         arbitrary code execution.
       * MFSA 2014-67: Mozilla developers and community identified and fixed
         several memory safety bugs in the browser engine used in Firefox and
         other Mozilla-based products. Some of these bugs showed evidence of
   memory corruption under certain circumstances, and we presume that with
   enough effort at least some of these could be exploited to run arbitrary
   code.
       * Jan de Mooij reported a memory safety problem that affects Firefox
         ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

   More information is referenced on:
   https://www.mozilla.org/security/announce/
   <https://www.mozilla.org/security/announce/> .

   Security Issues:

       * CVE-2014-1567
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567>
       * CVE-2014-1562
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562>

Package List:

   – SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

      firefox-gtk2-2.18.9-0.11.1
      firefox-gtk2-lang-2.18.9-0.11.1
      mozilla-nspr-4.10.7-0.5.1
      mozilla-nspr-devel-4.10.7-0.5.1
      mozilla-nss-3.16.4-0.5.2
      mozilla-nss-devel-3.16.4-0.5.2
      mozilla-nss-tools-3.16.4-0.5.2

   – SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

      firefox-gtk2-32bit-2.18.9-0.11.1
      mozilla-nspr-32bit-4.10.7-0.5.1
      mozilla-nss-32bit-3.16.4-0.5.2

   – SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x):

      MozillaFirefox-24.8.0esr-0.5.1
      MozillaFirefox-translations-24.8.0esr-0.5.1

References:

   http://support.novell.com/security/cve/CVE-2014-1562.html
   http://support.novell.com/security/cve/CVE-2014-1567.html
   https://bugzilla.novell.com/882881
   https://bugzilla.novell.com/894370
   http://download.suse.com/patch/finder/?keywords=24d0f20857a99b68fbd08945af76c27a


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarko Stanec
Cert idNCERT-REF-2014-09-0030-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa glibc

Otkriveni su sigurnosni nedostaci u programskom paketu glibc za operacijski sustav openSuse. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close