openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:0607-1
Rating:             important
References:         #923534 
Cross-References:   CVE-2015-0817 CVE-2015-0818
Affected Products:
                    openSUSE 13.2
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   MozillaFirefox was updated to Firefox 36.0.4 to fix two critical security
   issues found during Pwn2Own:

     * MFSA 2015-28/CVE-2015-0818 (bmo#1144988) Privilege escalation through
       SVG navigation

     * MFSA 2015-29/CVE-2015-0817 (bmo#1145255) Code execution through
       incorrect JavaScript bounds checking elimination

   Als fixed were the following bugs:
   - Copy the icons to /usr/share/icons instead of symlinking them: in
     preparation for containerized apps (e.g. xdg-app) as well as AppStream
     metadata extraction, there are a couple locations that need to be real
     files for system integration (.desktop files, icons, mime-type info).

   - update to Firefox 36.0.1 Bugfixes:
     * Disable the usage of the ANY DNS query type (bmo#1093983)
     * Hello may become inactive until restart (bmo#1137469)
     * Print preferences may not be preserved (bmo#1136855)
     * Hello contact tabs may not be visible (bmo#1137141)
     * Accept hostnames that include an underscore character ("_")
       (bmo#1136616)
     * WebGL may use significant memory with Canvas2d (bmo#1137251)
     * Option -remote has been restored (bmo#1080319)


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2015-263=1

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2015-263=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      MozillaFirefox-36.0.4-18.1
      MozillaFirefox-branding-upstream-36.0.4-18.1
      MozillaFirefox-buildsymbols-36.0.4-18.1
      MozillaFirefox-debuginfo-36.0.4-18.1
      MozillaFirefox-debugsource-36.0.4-18.1
      MozillaFirefox-devel-36.0.4-18.1
      MozillaFirefox-translations-common-36.0.4-18.1
      MozillaFirefox-translations-other-36.0.4-18.1

   - openSUSE 13.1 (i586 x86_64):

      MozillaFirefox-36.0.4-63.1
      MozillaFirefox-branding-upstream-36.0.4-63.1
      MozillaFirefox-buildsymbols-36.0.4-63.1
      MozillaFirefox-debuginfo-36.0.4-63.1
      MozillaFirefox-debugsource-36.0.4-63.1
      MozillaFirefox-devel-36.0.4-63.1
      MozillaFirefox-translations-common-36.0.4-63.1
      MozillaFirefox-translations-other-36.0.4-63.1


References:

   https://www.suse.com/security/cve/CVE-2015-0817.html
   https://www.suse.com/security/cve/CVE-2015-0818.html
   https://bugzilla.suse.com/923534

openSUSE: 2015:0607-1: important: MozillaFirefox

March 26, 2015
An update that fixes two vulnerabilities is now available

Description

MozillaFirefox was updated to Firefox 36.0.4 to fix two critical security issues found during Pwn2Own: * MFSA 2015-28/CVE-2015-0818 (bmo#1144988) Privilege escalation through SVG navigation * MFSA 2015-29/CVE-2015-0817 (bmo#1145255) Code execution through incorrect JavaScript bounds checking elimination Als fixed were the following bugs: - Copy the icons to /usr/share/icons instead of symlinking them: in preparation for containerized apps (e.g. xdg-app) as well as AppStream metadata extraction, there are a couple locations that need to be real files for system integration (.desktop files, icons, mime-type info). - update to Firefox 36.0.1 Bugfixes: * Disable the usage of the ANY DNS query type (bmo#1093983) * Hello may become inactive until restart (bmo#1137469) * Print preferences may not be preserved (bmo#1136855) * Hello contact tabs may not be visible (bmo#1137141) * Accept hostnames that include an underscore character ("_") (bmo#1136616) * WebGL may use significant memory with Canvas2d (bmo#1137251) * Option -remote has been restored (bmo#1080319)

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-263=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-263=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.2 (i586 x86_64): MozillaFirefox-36.0.4-18.1 MozillaFirefox-branding-upstream-36.0.4-18.1 MozillaFirefox-buildsymbols-36.0.4-18.1 MozillaFirefox-debuginfo-36.0.4-18.1 MozillaFirefox-debugsource-36.0.4-18.1 MozillaFirefox-devel-36.0.4-18.1 MozillaFirefox-translations-common-36.0.4-18.1 MozillaFirefox-translations-other-36.0.4-18.1 - openSUSE 13.1 (i586 x86_64): MozillaFirefox-36.0.4-63.1 MozillaFirefox-branding-upstream-36.0.4-63.1 MozillaFirefox-buildsymbols-36.0.4-63.1 MozillaFirefox-debuginfo-36.0.4-63.1 MozillaFirefox-debugsource-36.0.4-63.1 MozillaFirefox-devel-36.0.4-63.1 MozillaFirefox-translations-common-36.0.4-63.1 MozillaFirefox-translations-other-36.0.4-63.1


References

https://www.suse.com/security/cve/CVE-2015-0817.html https://www.suse.com/security/cve/CVE-2015-0818.html https://bugzilla.suse.com/923534


Severity
Announcement ID: openSUSE-SU-2015:0607-1
Rating: important
Affected Products: openSUSE 13.2 openSUSE 13.1 .

Related News