SuSE: 2015:0076-1: important: MozillaFirefox
Summary
This update fixes the following security issues in MozillaFirefox: - MFSA 2015-01/CVE-2014-8634/CVE-2014-8635 (bmo#1109889, bmo#1111737, bmo#1026774, bmo#1027300, bmo#1054538, bmo#1067473, bmo#1070962, bmo#1072130, bmo#1072871, bmo#1098583) Miscellaneous memory safety hazards (rv:35.0 / rv:31.4) - MFSA 2015-03/CVE-2014-8638 (bmo#1080987) sendBeacon requests lack an Origin header - MFSA 2015-04/CVE-2014-8639 (bmo#1095859) Cookie injection through Proxy Authenticate responses - MFSA 2015-06/CVE-2014-8641 (bmo#1108455) Read-after-free in WebRTC Also Mozilla NSS was updated to 3.17.3 to fix: * The QuickDER decoder now decodes lengths robustly (bmo#1064670/CVE-2014-1569) * Support for TLS_FALLBACK_SCSV has been added to the ssltap and tstclnt utilities * Changes in CA certificates Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your ...
Read the Full AdvisoryReferences
#909563 #910647 #910669
Cross- CVE-2014-1569 CVE-2014-8634 CVE-2014-8635
CVE-2014-8638 CVE-2014-8639 CVE-2014-8641
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
https://www.suse.com/security/cve/CVE-2014-1569.html
https://www.suse.com/security/cve/CVE-2014-8634.html
https://www.suse.com/security/cve/CVE-2014-8635.html
https://www.suse.com/security/cve/CVE-2014-8638.html
https://www.suse.com/security/cve/CVE-2014-8639.html
https://www.suse.com/security/cve/CVE-2014-8641.html
https://bugzilla.suse.com/show_bug.cgi?id=909563
https://bugzilla.suse.com/show_bug.cgi?id=910647
https://bugzilla.suse.com/show_bug.cgi?id=910669