SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1120-2
Rating:             important
References:         #882881 #894370 
Cross-References:   CVE-2014-1562 CVE-2014-1567
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.
   It includes two new package versions.

Description:


   Mozilla Firefox was updated to the 24.8.0ESR release, fixing security
   issues and bugs.

   Only some of the published security advisories affect the Mozilla Firefox
   24ESR codestream:

       * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
         reported, via TippingPoint's Zero Day Initiative, a use-after-free
         during text layout when interacting with the setting of text
         direction. This results in a use-after-free which can lead to
         arbitrary code execution.
       * MFSA 2014-67: Mozilla developers and community identified and fixed
         several memory safety bugs in the browser engine used in Firefox and
         other Mozilla-based products. Some of these bugs showed evidence of
   memory corruption under certain circumstances, and we presume that with
   enough effort at least some of these could be exploited to run arbitrary
   code.
       * Jan de Mooij reported a memory safety problem that affects Firefox
         ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

   More information is referenced on:
   https://www.mozilla.org/en-US/security/advisories/
    .

   Security Issues:

       * CVE-2014-1567
         
       * CVE-2014-1562
         



Package List:

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

      firefox-gtk2-2.18.9-0.11.1
      firefox-gtk2-lang-2.18.9-0.11.1
      mozilla-nspr-4.10.7-0.5.1
      mozilla-nspr-devel-4.10.7-0.5.1
      mozilla-nss-3.16.4-0.5.2
      mozilla-nss-devel-3.16.4-0.5.2
      mozilla-nss-tools-3.16.4-0.5.2

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 3.16.4 and 4.10.7]:

      firefox-gtk2-32bit-2.18.9-0.11.1
      mozilla-nspr-32bit-4.10.7-0.5.1
      mozilla-nss-32bit-3.16.4-0.5.2

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x):

      MozillaFirefox-24.8.0esr-0.5.1
      MozillaFirefox-translations-24.8.0esr-0.5.1


References:

   https://www.suse.com/security/cve/CVE-2014-1562.html
   https://www.suse.com/security/cve/CVE-2014-1567.html
   https://bugzilla.novell.com/882881
   https://bugzilla.novell.com/894370
   https://scc.suse.com:443/patches/

SuSE: 2014:1120-2: important: MozillaFirefox

September 12, 2014
An update that fixes two vulnerabilities is now available

Summary

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs. Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream: * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with the setting of text direction. This results in a use-after-free which can lead to arbitrary code execution. * MFSA 2014-67: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * Jan de Mooij reported a memory safety problem that affects Firefox ES...

Read the Full Advisory

References

#882881 #894370

Cross- CVE-2014-1562 CVE-2014-1567

Affected Products:

SUSE Linux Enterprise Server 10 SP4 LTSS

https://www.suse.com/security/cve/CVE-2014-1562.html

https://www.suse.com/security/cve/CVE-2014-1567.html

https://bugzilla.novell.com/882881

https://bugzilla.novell.com/894370

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:1120-2
Rating: important

Related News