You are here
Home > Preporuke > Ranjivosti programskog paketa MozillaFirefox

Ranjivosti programskog paketa MozillaFirefox

  • Detalji os-a: LSU
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for MozillaFirefox

Announcement ID: SUSE-SU-2014:1112-2
Rating: important
References: #894370
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS

An update that contains security fixes can now be
installed. It includes three new package versions.


Mozilla Firefox was updated to the 24.8.0ESR release, fixing security
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox
24ESR codestream:

* MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
reported, via TippingPoint’s Zero Day Initiative, a use-after-free
during text layout when interacting with the setting of text
direction. This results in a use-after-free which can lead to
arbitrary code execution.
* MFSA 2014-67: Mozilla developers and community identified and fixed
several memory safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed evidence of
memory corruption under certain circumstances, and we presume that with
enough effort at least some of these could be exploited to run arbitrary
* Jan de Mooij reported a memory safety problem that affects Firefox
ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on:
<> .

Security Issues:

* CVE-2014-1562
* CVE-2014-1567

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11 SP1 LTSS:

zypper in -t patch slessp1-firefox-201409-9681

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 24.8.0esr,3.16.4 and 4.10.7]:


– SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 3.16.4 and 4.10.7]:



To unsubscribe, e-mail:
For additional commands, e-mail:

AutorTomislav Protega
Cert idNCERT-REF-2014-09-0011-ADV
CveCVE-2014-1567 CVE-2014-1562
ID izvornikaSUSE-SU-2014:1112-2
More in Preporuke
Sigurnosni nedostaci programskog paketa curl

Otkriveni su sigurnosni nedostaci u programskom paketu curl za operacijski sustav Fedora 20. Otkriveni nedostaci su posljedica neispravnog rukovanja s...