SUSE Security Update: Security update for MozillaFirefox, mozilla-nspr, mozilla-nss
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:1269-1
Rating:             important
References:         #856315 #935033 #935979 
Cross-References:   CVE-2015-2721 CVE-2015-2722 CVE-2015-2724
                    CVE-2015-2725 CVE-2015-2726 CVE-2015-2728
                    CVE-2015-2730 CVE-2015-2733 CVE-2015-2734
                    CVE-2015-2735 CVE-2015-2736 CVE-2015-2737
                    CVE-2015-2738 CVE-2015-2739 CVE-2015-2740
                    CVE-2015-2743 CVE-2015-4000
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that fixes 17 vulnerabilities is now available.

Description:

   MozillaFirefox, mozilla-nspr and  mozilla-nss were updated to fix 17
   security issues.

   For more details please check the changelogs.
   - CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety
     hazards (bsc#935979).
   - CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
   - CVE-2015-2730: ECDSA signature validation fails to handle some
     signatures correctly (bsc#935979).
   - CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using
     XMLHttpRequest (bsc#935979).
   -
   CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2
     015-2739/CVE-2015-2740: Vulnerabilities found through code inspection
     (bsc#935979).
   - CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
   - CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE
     cipher suites (bsc#935033).
   - CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange
     (bsc#935979).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2015-330=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2015-330=1

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-330=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      MozillaFirefox-debuginfo-31.8.0esr-37.3
      MozillaFirefox-debugsource-31.8.0esr-37.3
      MozillaFirefox-devel-31.8.0esr-37.3
      mozilla-nspr-debuginfo-4.10.8-3.1
      mozilla-nspr-debugsource-4.10.8-3.1
      mozilla-nspr-devel-4.10.8-3.1
      mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1
      mozilla-nss-devel-3.19.2_CKBI_1.98-21.1

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      MozillaFirefox-31.8.0esr-37.3
      MozillaFirefox-debuginfo-31.8.0esr-37.3
      MozillaFirefox-debugsource-31.8.0esr-37.3
      MozillaFirefox-translations-31.8.0esr-37.3
      libfreebl3-3.19.2_CKBI_1.98-21.1
      libfreebl3-debuginfo-3.19.2_CKBI_1.98-21.1
      libfreebl3-hmac-3.19.2_CKBI_1.98-21.1
      libsoftokn3-3.19.2_CKBI_1.98-21.1
      libsoftokn3-debuginfo-3.19.2_CKBI_1.98-21.1
      libsoftokn3-hmac-3.19.2_CKBI_1.98-21.1
      mozilla-nspr-4.10.8-3.1
      mozilla-nspr-debuginfo-4.10.8-3.1
      mozilla-nspr-debugsource-4.10.8-3.1
      mozilla-nss-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-debuginfo-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1
      mozilla-nss-tools-3.19.2_CKBI_1.98-21.1
      mozilla-nss-tools-debuginfo-3.19.2_CKBI_1.98-21.1

   - SUSE Linux Enterprise Server 12 (s390x x86_64):

      libfreebl3-32bit-3.19.2_CKBI_1.98-21.1
      libfreebl3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      libfreebl3-hmac-32bit-3.19.2_CKBI_1.98-21.1
      libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1
      libsoftokn3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      libsoftokn3-hmac-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nspr-32bit-4.10.8-3.1
      mozilla-nspr-debuginfo-32bit-4.10.8-3.1
      mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debuginfo-32bit-3.19.2_CKBI_1.98-21.1

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      MozillaFirefox-31.8.0esr-37.3
      MozillaFirefox-debuginfo-31.8.0esr-37.3
      MozillaFirefox-debugsource-31.8.0esr-37.3
      MozillaFirefox-translations-31.8.0esr-37.3
      libfreebl3-3.19.2_CKBI_1.98-21.1
      libfreebl3-32bit-3.19.2_CKBI_1.98-21.1
      libfreebl3-debuginfo-3.19.2_CKBI_1.98-21.1
      libfreebl3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      libsoftokn3-3.19.2_CKBI_1.98-21.1
      libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1
      libsoftokn3-debuginfo-3.19.2_CKBI_1.98-21.1
      libsoftokn3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nspr-32bit-4.10.8-3.1
      mozilla-nspr-4.10.8-3.1
      mozilla-nspr-debuginfo-32bit-4.10.8-3.1
      mozilla-nspr-debuginfo-4.10.8-3.1
      mozilla-nspr-debugsource-4.10.8-3.1
      mozilla-nss-3.19.2_CKBI_1.98-21.1
      mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-debuginfo-3.19.2_CKBI_1.98-21.1
      mozilla-nss-certs-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debuginfo-32bit-3.19.2_CKBI_1.98-21.1
      mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1
      mozilla-nss-tools-3.19.2_CKBI_1.98-21.1
      mozilla-nss-tools-debuginfo-3.19.2_CKBI_1.98-21.1


References:

   https://www.suse.com/security/cve/CVE-2015-2721.html
   https://www.suse.com/security/cve/CVE-2015-2722.html
   https://www.suse.com/security/cve/CVE-2015-2724.html
   https://www.suse.com/security/cve/CVE-2015-2725.html
   https://www.suse.com/security/cve/CVE-2015-2726.html
   https://www.suse.com/security/cve/CVE-2015-2728.html
   https://www.suse.com/security/cve/CVE-2015-2730.html
   https://www.suse.com/security/cve/CVE-2015-2733.html
   https://www.suse.com/security/cve/CVE-2015-2734.html
   https://www.suse.com/security/cve/CVE-2015-2735.html
   https://www.suse.com/security/cve/CVE-2015-2736.html
   https://www.suse.com/security/cve/CVE-2015-2737.html
   https://www.suse.com/security/cve/CVE-2015-2738.html
   https://www.suse.com/security/cve/CVE-2015-2739.html
   https://www.suse.com/security/cve/CVE-2015-2740.html
   https://www.suse.com/security/cve/CVE-2015-2743.html
   https://www.suse.com/security/cve/CVE-2015-4000.html
   https://bugzilla.suse.com/856315
   https://bugzilla.suse.com/935033
   https://bugzilla.suse.com/935979

SuSE: 2015:1269-1: important: MozillaFirefox, mozilla-nspr, mozilla-nss

July 20, 2015
An update that fixes 17 vulnerabilities is now available

Summary

MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues. For more details please check the changelogs. - CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979). - CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979). - CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979). - CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979). - CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2 015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979). - CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979). - CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033). - CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-330=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-330=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-330=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): MozillaFirefox-debuginfo-31.8.0esr-37.3 MozillaFirefox-debugsource-31.8.0esr-37.3 MozillaFirefox-devel-31.8.0esr-37.3 mozilla-nspr-debuginfo-4.10.8-3.1 mozilla-nspr-debugsource-4.10.8-3.1 mozilla-nspr-devel-4.10.8-3.1 mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1 mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1 mozilla-nss-devel-3.19.2_CKBI_1.98-21.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): MozillaFirefox-31.8.0esr-37.3 MozillaFirefox-debuginfo-31.8.0esr-37.3 MozillaFirefox-debugsource-31.8.0esr-37.3 MozillaFirefox-translations-31.8.0esr-37.3 libfreebl3-3.19.2_CKBI_1.98-21.1 libfreebl3-debuginfo-3.19.2_CKBI_1.98-21.1 libfreebl3-hmac-3.19.2_CKBI_1.98-21.1 libsoftokn3-3.19.2_CKBI_1.98-21.1 libsoftokn3-debuginfo-3.19.2_CKBI_1.98-21.1 libsoftokn3-hmac-3.19.2_CKBI_1.98-21.1 mozilla-nspr-4.10.8-3.1 mozilla-nspr-debuginfo-4.10.8-3.1 mozilla-nspr-debugsource-4.10.8-3.1 mozilla-nss-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-debuginfo-3.19.2_CKBI_1.98-21.1 mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1 mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1 mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 mozilla-nss-tools-debuginfo-3.19.2_CKBI_1.98-21.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 libfreebl3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 libfreebl3-hmac-32bit-3.19.2_CKBI_1.98-21.1 libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 libsoftokn3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 libsoftokn3-hmac-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nspr-32bit-4.10.8-3.1 mozilla-nspr-debuginfo-32bit-4.10.8-3.1 mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 - SUSE Linux Enterprise Desktop 12 (x86_64): MozillaFirefox-31.8.0esr-37.3 MozillaFirefox-debuginfo-31.8.0esr-37.3 MozillaFirefox-debugsource-31.8.0esr-37.3 MozillaFirefox-translations-31.8.0esr-37.3 libfreebl3-3.19.2_CKBI_1.98-21.1 libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 libfreebl3-debuginfo-3.19.2_CKBI_1.98-21.1 libfreebl3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 libsoftokn3-3.19.2_CKBI_1.98-21.1 libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 libsoftokn3-debuginfo-3.19.2_CKBI_1.98-21.1 libsoftokn3-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nspr-32bit-4.10.8-3.1 mozilla-nspr-4.10.8-3.1 mozilla-nspr-debuginfo-32bit-4.10.8-3.1 mozilla-nspr-debuginfo-4.10.8-3.1 mozilla-nspr-debugsource-4.10.8-3.1 mozilla-nss-3.19.2_CKBI_1.98-21.1 mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-debuginfo-3.19.2_CKBI_1.98-21.1 mozilla-nss-certs-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-debuginfo-3.19.2_CKBI_1.98-21.1 mozilla-nss-debuginfo-32bit-3.19.2_CKBI_1.98-21.1 mozilla-nss-debugsource-3.19.2_CKBI_1.98-21.1 mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 mozilla-nss-tools-debuginfo-3.19.2_CKBI_1.98-21.1

References

#856315 #935033 #935979

Cross- CVE-2015-2721 CVE-2015-2722 CVE-2015-2724

CVE-2015-2725 CVE-2015-2726 CVE-2015-2728

CVE-2015-2730 CVE-2015-2733 CVE-2015-2734

CVE-2015-2735 CVE-2015-2736 CVE-2015-2737

CVE-2015-2738 CVE-2015-2739 CVE-2015-2740

CVE-2015-2743 CVE-2015-4000

Affected Products:

SUSE Linux Enterprise Software Development Kit 12

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Desktop 12

https://www.suse.com/security/cve/CVE-2015-2721.html

https://www.suse.com/security/cve/CVE-2015-2722.html

https://www.suse.com/security/cve/CVE-2015-2724.html

https://www.suse.com/security/cve/CVE-2015-2725.html

https://www.suse.com/security/cve/CVE-2015-2726.html

https://www.suse.com/security/cve/CVE-2015-2728.html

https://www.suse.com/security/cve/CVE-2015-2730.html

https://www.suse.com/security/cve/CVE-2015-2733.html

https://www.suse.com/security/cve/CVE-2015-2734.html

https://www.suse.com/security/cve/CVE-2015-2735.html

https://www.suse.com/security/cve/CVE-2015-2736.html

https://www.suse.com/security/cve/CVE-2015-2737.html

https://www.suse.com/security/cve/CVE-2015-2738.html

https://www.suse.com/security/cve/CVE-2015-2739.html

https://www.suse.com/security/cve/CVE-2015-2740.html

https://www.suse.com/security/cve/CVE-2015-2743.html

https://www.suse.com/security/cve/CVE-2015-4000.html

https://bugzilla.suse.com/856315

https://bugzilla.suse.com/935033

https://bugzilla.suse.com/935979

Severity
Announcement ID: SUSE-SU-2015:1269-1
Rating: important

Related News