openSUSE: 2013:0131-1: important: Mozilla Januarys
Description
The Mozilla January 8th 2013 security release contains updates: Mozilla Firefox was updated to version 18.0. Mozilla Seamonkey was updated to version 2.15. Mozilla Thunderbird was updated to version 17.0.2. * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770 Miscellaneous memory safety hazards * MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0 767 CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829 Use-after-free and buffer overflow issues found using Address Sanitizer * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow in Canvas * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in addressbar during page loads * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free when displaying table with many columns and column groups * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are shared across iframes * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to handling of SSL on thr...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4/standard/i586/patchinfo.40: zypper in -t patch 2013-4 To bring your system up-to-date, use "zypper patch".
Package List
- openSUSE 11.4/standard/i586/patchinfo.40 (i586 x86_64): MozillaFirefox-18.0-57.1 MozillaFirefox-branding-upstream-18.0-57.1 MozillaFirefox-buildsymbols-18.0-57.1 MozillaFirefox-debuginfo-18.0-57.1 MozillaFirefox-debugsource-18.0-57.1 MozillaFirefox-devel-18.0-57.1 MozillaFirefox-translations-common-18.0-57.1 MozillaFirefox-translations-other-18.0-57.1 MozillaThunderbird-17.0.2-45.1 MozillaThunderbird-buildsymbols-17.0.2-45.1 MozillaThunderbird-debuginfo-17.0.2-45.1 MozillaThunderbird-debugsource-17.0.2-45.1 MozillaThunderbird-devel-17.0.2-45.1 MozillaThunderbird-devel-debuginfo-17.0.2-45.1 MozillaThunderbird-translations-common-17.0.2-45.1 MozillaThunderbird-translations-other-17.0.2-45.1 enigmail-1.5.0+17.0.2-45.1 enigmail-debuginfo-1.5.0+17.0.2-45.1 libfreebl3-3.14.1-51.1 libfreebl3-debuginfo-3.14.1-51.1 libsoftokn3-3.14.1-51.1 libsoftokn3-debuginfo-3.14.1-51.1 mozilla-nspr-4.9.4-20.1 mozilla-nspr-debuginfo-4.9.4-20.1 mozilla-nspr-debugsource-4.9.4-20.1 mozilla-nspr-devel-4.9.4-20.1 mozilla-nss-3.14.1-51.1 mozilla-nss-certs-3.14.1-51.1 mozilla-nss-certs-debuginfo-3.14.1-51.1 mozilla-nss-debuginfo-3.14.1-51.1 mozilla-nss-debugsource-3.14.1-51.1 mozilla-nss-devel-3.14.1-51.1 mozilla-nss-sysinit-3.14.1-51.1 mozilla-nss-sysinit-debuginfo-3.14.1-51.1 mozilla-nss-tools-3.14.1-51.1 mozilla-nss-tools-debuginfo-3.14.1-51.1 seamonkey-2.15-49.1 seamonkey-debuginfo-2.15-49.1 seamonkey-debugsource-2.15-49.1 seamonkey-dom-inspector-2.15-49.1 seamonkey-irc-2.15-49.1 seamonkey-translations-common-2.15-49.1 seamonkey-translations-other-2.15-49.1 seamonkey-venkman-2.15-49.1 - openSUSE 11.4/standard/i586/patchinfo.40 (x86_64): libfreebl3-32bit-3.14.1-51.1 libfreebl3-debuginfo-32bit-3.14.1-51.1 libsoftokn3-32bit-3.14.1-51.1 libsoftokn3-debuginfo-32bit-3.14.1-51.1 mozilla-nspr-32bit-4.9.4-20.1 mozilla-nspr-debuginfo-32bit-4.9.4-20.1 mozilla-nss-32bit-3.14.1-51.1 mozilla-nss-certs-32bit-3.14.1-51.1 mozilla-nss-certs-debuginfo-32bit-3.14.1-51.1 mozilla-nss-debuginfo-32bit-3.14.1-51.1 mozilla-nss-sysinit-32bit-3.14.1-51.1 mozilla-nss-sysinit-debuginfo-32bit-3.14.1-51.1 - openSUSE 11.4/standard/i586/patchinfo.40 (ia64): libfreebl3-debuginfo-x86-3.14.1-51.1 libfreebl3-x86-3.14.1-51.1 libsoftokn3-debuginfo-x86-3.14.1-51.1 libsoftokn3-x86-3.14.1-51.1 mozilla-nspr-debuginfo-x86-4.9.4-20.1 mozilla-nspr-x86-4.9.4-20.1 mozilla-nss-certs-debuginfo-x86-3.14.1-51.1 mozilla-nss-certs-x86-3.14.1-51.1 mozilla-nss-debuginfo-x86-3.14.1-51.1 mozilla-nss-sysinit-debuginfo-x86-3.14.1-51.1 mozilla-nss-sysinit-x86-3.14.1-51.1 mozilla-nss-x86-3.14.1-51.1
References
https://www.suse.com/security/cve/CVE-2012-0759.html https://www.suse.com/security/cve/CVE-2012-5829.html https://www.suse.com/security/cve/CVE-2013-0743.html https://www.suse.com/security/cve/CVE-2013-0744.html https://www.suse.com/security/cve/CVE-2013-0745.html https://www.suse.com/security/cve/CVE-2013-0746.html https://www.suse.com/security/cve/CVE-2013-0747.html https://www.suse.com/security/cve/CVE-2013-0748.html https://www.suse.com/security/cve/CVE-2013-0749.html https://www.suse.com/security/cve/CVE-2013-0750.html https://www.suse.com/security/cve/CVE-2013-0751.html https://www.suse.com/security/cve/CVE-2013-0752.html https://www.suse.com/security/cve/CVE-2013-0753.html https://www.suse.com/security/cve/CVE-2013-0754.html https://www.suse.com/security/cve/CVE-2013-0755.html https://www.suse.com/security/cve/CVE-2013-0756.html https://www.suse.com/security/cve/CVE-2013-0757.html https://www.suse.com/security/cve/CVE-2013-0758.html https://www.suse.com/security/cve/CVE-2013-0760.html https://www.suse.com/security/cve/CVE-2013-0761.html https://www.suse.com/security/cve/CVE-2013-0762.html https://www.suse.com/security/cve/CVE-2013-0763.html https://www.suse.com/security/cve/CVE-2013-0764.html https://www.suse.com/security/cve/CVE-2013-0766.html https://www.suse.com/security/cve/CVE-2013-0767.html https://www.suse.com/security/cve/CVE-2013-0768.html https://www.suse.com/security/cve/CVE-2013-0769.html https://www.suse.com/security/cve/CVE-2013-0770.html https://www.suse.com/security/cve/CVE-2013-0771.html https://bugzilla.novell.com/796628 https://bugzilla.novell.com/796895