You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Firefox

Sigurnosni nedostaci programskog paketa Firefox

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Firefox update to latest 31ESR release
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0138-1
Rating: important
References: #876833 #894370 #900639 #900941 #908009 #910669

Cross-References: 2013-5611 2013-5612 2013-5614 2013-5619 2013-6672
2014-1480 2014-1483 2014-1484 2014-1485 2014-1488
2014-1489 2014-1492 2014-1498 2014-1499 2014-1500
2014-1502 2014-1504 2014-1519 2014-1522 2014-1525
2014-1526 2014-1528 2014-1539 2014-1540 2014-1542
2014-1543 2014-1549 2014-1550 2014-1552 2014-1553
2014-1558 2014-1559 2014-1560 2014-1561 2014-1563
2014-1564 2014-1565 2014-1574 2014-1576 2014-1577
2014-1578 2014-1581 2014-1583 2014-1585 2014-1586
2014-1587 2014-1590 2014-1592 2014-1593 2014-1594
2014-8634 2014-8635 2014-8638 2014-8639 2014-8641
CVE-2014-1553 CVE-2014-1562 CVE-2014-1563
CVE-2014-1564 CVE-2014-1565 CVE-2014-1567
CVE-2014-1569 CVE-2014-1574 CVE-2014-1576
CVE-2014-1577 CVE-2014-1578 CVE-2014-1581
CVE-2014-1585 CVE-2014-1586 CVE-2014-1587
CVE-2014-1590 CVE-2014-1592 CVE-2014-1593
CVE-2014-1594
Affected Products:
openSUSE Evergreen 11.4
______________________________________________________________________________

An update that fixes 74 vulnerabilities is now available.

Description:

This update lifts Firefox to the latest 31 ESR release to fix known
security issues.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Evergreen 11.4:

zypper in -t patch 2015-4

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Evergreen 11.4 (i586 x86_64):

MozillaFirefox-31.4.0-133.1
MozillaFirefox-branding-upstream-31.4.0-133.1
MozillaFirefox-buildsymbols-31.4.0-133.1
MozillaFirefox-debuginfo-31.4.0-133.1
MozillaFirefox-debugsource-31.4.0-133.1
MozillaFirefox-devel-31.4.0-133.1
MozillaFirefox-translations-common-31.4.0-133.1
MozillaFirefox-translations-other-31.4.0-133.1
libfreebl3-3.17.3-104.1
libfreebl3-debuginfo-3.17.3-104.1
libsoftokn3-3.17.3-104.1
libsoftokn3-debuginfo-3.17.3-104.1
mozilla-nspr-4.10.7-49.1
mozilla-nspr-debuginfo-4.10.7-49.1
mozilla-nspr-debugsource-4.10.7-49.1
mozilla-nspr-devel-4.10.7-49.1
mozilla-nss-3.17.3-104.1
mozilla-nss-certs-3.17.3-104.1
mozilla-nss-certs-debuginfo-3.17.3-104.1
mozilla-nss-debuginfo-3.17.3-104.1
mozilla-nss-debugsource-3.17.3-104.1
mozilla-nss-devel-3.17.3-104.1
mozilla-nss-sysinit-3.17.3-104.1
mozilla-nss-sysinit-debuginfo-3.17.3-104.1
mozilla-nss-tools-3.17.3-104.1
mozilla-nss-tools-debuginfo-3.17.3-104.1

– openSUSE Evergreen 11.4 (x86_64):

libfreebl3-32bit-3.17.3-104.1
libfreebl3-debuginfo-32bit-3.17.3-104.1
libsoftokn3-32bit-3.17.3-104.1
libsoftokn3-debuginfo-32bit-3.17.3-104.1
mozilla-nspr-32bit-4.10.7-49.1
mozilla-nspr-debuginfo-32bit-4.10.7-49.1
mozilla-nss-32bit-3.17.3-104.1
mozilla-nss-certs-32bit-3.17.3-104.1
mozilla-nss-certs-debuginfo-32bit-3.17.3-104.1
mozilla-nss-debuginfo-32bit-3.17.3-104.1
mozilla-nss-sysinit-32bit-3.17.3-104.1
mozilla-nss-sysinit-debuginfo-32bit-3.17.3-104.1

– openSUSE Evergreen 11.4 (ia64):

libfreebl3-debuginfo-x86-3.17.3-104.1
libfreebl3-x86-3.17.3-104.1
libsoftokn3-debuginfo-x86-3.17.3-104.1
libsoftokn3-x86-3.17.3-104.1
mozilla-nspr-debuginfo-x86-4.10.7-49.1
mozilla-nspr-x86-4.10.7-49.1
mozilla-nss-certs-debuginfo-x86-3.17.3-104.1
mozilla-nss-certs-x86-3.17.3-104.1
mozilla-nss-debuginfo-x86-3.17.3-104.1
mozilla-nss-sysinit-debuginfo-x86-3.17.3-104.1
mozilla-nss-sysinit-x86-3.17.3-104.1
mozilla-nss-x86-3.17.3-104.1

References:

http://support.novell.com/security/cve/2013-5611.html
http://support.novell.com/security/cve/2013-5612.html
http://support.novell.com/security/cve/2013-5614.html
http://support.novell.com/security/cve/2013-5619.html
http://support.novell.com/security/cve/2013-6672.html
http://support.novell.com/security/cve/2014-1480.html
http://support.novell.com/security/cve/2014-1483.html
http://support.novell.com/security/cve/2014-1484.html
http://support.novell.com/security/cve/2014-1485.html
http://support.novell.com/security/cve/2014-1488.html
http://support.novell.com/security/cve/2014-1489.html
http://support.novell.com/security/cve/2014-1492.html
http://support.novell.com/security/cve/2014-1498.html
http://support.novell.com/security/cve/2014-1499.html
http://support.novell.com/security/cve/2014-1500.html
http://support.novell.com/security/cve/2014-1502.html
http://support.novell.com/security/cve/2014-1504.html
http://support.novell.com/security/cve/2014-1519.html
http://support.novell.com/security/cve/2014-1522.html
http://support.novell.com/security/cve/2014-1525.html
http://support.novell.com/security/cve/2014-1526.html
http://support.novell.com/security/cve/2014-1528.html
http://support.novell.com/security/cve/2014-1539.html
http://support.novell.com/security/cve/2014-1540.html
http://support.novell.com/security/cve/2014-1542.html
http://support.novell.com/security/cve/2014-1543.html
http://support.novell.com/security/cve/2014-1549.html
http://support.novell.com/security/cve/2014-1550.html
http://support.novell.com/security/cve/2014-1552.html
http://support.novell.com/security/cve/2014-1553.html
http://support.novell.com/security/cve/2014-1558.html
http://support.novell.com/security/cve/2014-1559.html
http://support.novell.com/security/cve/2014-1560.html
http://support.novell.com/security/cve/2014-1561.html
http://support.novell.com/security/cve/2014-1563.html
http://support.novell.com/security/cve/2014-1564.html
http://support.novell.com/security/cve/2014-1565.html
http://support.novell.com/security/cve/2014-1574.html
http://support.novell.com/security/cve/2014-1576.html
http://support.novell.com/security/cve/2014-1577.html
http://support.novell.com/security/cve/2014-1578.html
http://support.novell.com/security/cve/2014-1581.html
http://support.novell.com/security/cve/2014-1583.html
http://support.novell.com/security/cve/2014-1585.html
http://support.novell.com/security/cve/2014-1586.html
http://support.novell.com/security/cve/2014-1587.html
http://support.novell.com/security/cve/2014-1590.html
http://support.novell.com/security/cve/2014-1592.html
http://support.novell.com/security/cve/2014-1593.html
http://support.novell.com/security/cve/2014-1594.html
http://support.novell.com/security/cve/2014-8634.html
http://support.novell.com/security/cve/2014-8635.html
http://support.novell.com/security/cve/2014-8638.html
http://support.novell.com/security/cve/2014-8639.html
http://support.novell.com/security/cve/2014-8641.html
http://support.novell.com/security/cve/CVE-2014-1553.html
http://support.novell.com/security/cve/CVE-2014-1562.html
http://support.novell.com/security/cve/CVE-2014-1563.html
http://support.novell.com/security/cve/CVE-2014-1564.html
http://support.novell.com/security/cve/CVE-2014-1565.html
http://support.novell.com/security/cve/CVE-2014-1567.html
http://support.novell.com/security/cve/CVE-2014-1569.html
http://support.novell.com/security/cve/CVE-2014-1574.html
http://support.novell.com/security/cve/CVE-2014-1576.html
http://support.novell.com/security/cve/CVE-2014-1577.html
http://support.novell.com/security/cve/CVE-2014-1578.html
http://support.novell.com/security/cve/CVE-2014-1581.html
http://support.novell.com/security/cve/CVE-2014-1585.html
http://support.novell.com/security/cve/CVE-2014-1586.html
http://support.novell.com/security/cve/CVE-2014-1587.html
http://support.novell.com/security/cve/CVE-2014-1590.html
http://support.novell.com/security/cve/CVE-2014-1592.html
http://support.novell.com/security/cve/CVE-2014-1593.html
http://support.novell.com/security/cve/CVE-2014-1594.html
https://bugzilla.suse.com/show_bug.cgi?id=876833
https://bugzilla.suse.com/show_bug.cgi?id=894370
https://bugzilla.suse.com/show_bug.cgi?id=900639
https://bugzilla.suse.com/show_bug.cgi?id=900941
https://bugzilla.suse.com/show_bug.cgi?id=908009
https://bugzilla.suse.com/show_bug.cgi?id=910669


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarijo Plepelic
Cert idNCERT-REF-2015-01-0021-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa kde-runtime

Otkrivena je ranjivost u alatu za upravljanje korisničkim lozinkama, kwallet, na sustavima s KDE sučeljem. Ranjivost se isticala korištenjem kriptografskog...

Close