[SUSE-SU-2016:2061-1] Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss

Severity Important
Affected Packages 36
CVEs 24

Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss

MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated to version 3.21.1, mozilla-nspr to version 4.12.

These security issues were fixed in 45.3.0ESR:
- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)
- CVE-2016-2830: Favicon network connection can persist when page is closed (MFSA 2016-63)
- CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)
- CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 (MFSA 2016-65)
- CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA 2016-67)
- CVE-2016-5254: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)
- CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)
- CVE-2016-5259: Use-after-free in service workers with nested sync events (MFSA 2016-73)
- CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)
- CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)
- CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)
- CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)
- CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
- CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Security issues fixed in 45.2.0.ESR:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
* Determine page size at runtime (bsc#984006)
* Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes
- Temporarily bind Firefox to the first CPU as a hotfix
for an apparent race condition (bsc#989196, bsc#990628)

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.

Package Affected Version
pkg:rpm/suse/MozillaFirefox?arch=x86_64&distro=sles-11&sp=2 < 45.3.0esr-48.1
pkg:rpm/suse/MozillaFirefox?arch=s390x&distro=sles-11&sp=2 < 45.3.0esr-48.1
pkg:rpm/suse/MozillaFirefox?arch=i586&distro=sles-11&sp=2 < 45.3.0esr-48.1
pkg:rpm/suse/MozillaFirefox-translations?arch=x86_64&distro=sles-11&sp=2 < 45.3.0esr-48.1
pkg:rpm/suse/MozillaFirefox-translations?arch=s390x&distro=sles-11&sp=2 < 45.3.0esr-48.1
pkg:rpm/suse/MozillaFirefox-translations?arch=i586&distro=sles-11&sp=2 < 45.3.0esr-48.1
pkg:rpm/suse/MozillaFirefox-branding-SLED?arch=x86_64&distro=sles-11&sp=2 < 45.0-20.38
pkg:rpm/suse/MozillaFirefox-branding-SLED?arch=s390x&distro=sles-11&sp=2 < 45.0-20.38
pkg:rpm/suse/MozillaFirefox-branding-SLED?arch=i586&distro=sles-11&sp=2 < 45.0-20.38
pkg:rpm/suse/mozilla-nss?arch=x86_64&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss?arch=s390x&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss?arch=i586&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-tools?arch=x86_64&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-tools?arch=s390x&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-tools?arch=i586&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-devel?arch=x86_64&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-devel?arch=s390x&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-devel?arch=i586&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-32bit?arch=x86_64&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nss-32bit?arch=s390x&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/mozilla-nspr?arch=x86_64&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr?arch=s390x&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr?arch=i586&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr-devel?arch=x86_64&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr-devel?arch=s390x&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr-devel?arch=i586&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr-32bit?arch=x86_64&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/mozilla-nspr-32bit?arch=s390x&distro=sles-11&sp=2 < 4.12-25.2
pkg:rpm/suse/libfreebl3?arch=x86_64&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/libfreebl3?arch=s390x&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/libfreebl3?arch=i586&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/libfreebl3-32bit?arch=x86_64&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/libfreebl3-32bit?arch=s390x&distro=sles-11&sp=2 < 3.21.1-26.2
pkg:rpm/suse/firefox-fontconfig?arch=x86_64&distro=sles-11&sp=2 < 2.11.0-4.2
pkg:rpm/suse/firefox-fontconfig?arch=s390x&distro=sles-11&sp=2 < 2.11.0-4.2
pkg:rpm/suse/firefox-fontconfig?arch=i586&distro=sles-11&sp=2 < 2.11.0-4.2
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2061-1.json
Suse URL for SUSE-SU-2016:2061-1 https://www.suse.com/support/update/announcement/2016/suse-su-20162061-1/
Suse E-Mail link for SUSE-SU-2016:2061-1 https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html
Bugzilla SUSE Bug 983549 https://bugzilla.suse.com/983549
Bugzilla SUSE Bug 983638 https://bugzilla.suse.com/983638
Bugzilla SUSE Bug 983639 https://bugzilla.suse.com/983639
Bugzilla SUSE Bug 983643 https://bugzilla.suse.com/983643
Bugzilla SUSE Bug 983646 https://bugzilla.suse.com/983646
Bugzilla SUSE Bug 983651 https://bugzilla.suse.com/983651
Bugzilla SUSE Bug 983652 https://bugzilla.suse.com/983652
Bugzilla SUSE Bug 983653 https://bugzilla.suse.com/983653
Bugzilla SUSE Bug 983655 https://bugzilla.suse.com/983655
Bugzilla SUSE Bug 984006 https://bugzilla.suse.com/984006
Bugzilla SUSE Bug 985659 https://bugzilla.suse.com/985659
Bugzilla SUSE Bug 989196 https://bugzilla.suse.com/989196
Bugzilla SUSE Bug 990628 https://bugzilla.suse.com/990628
Bugzilla SUSE Bug 990856 https://bugzilla.suse.com/990856
Bugzilla SUSE Bug 991809 https://bugzilla.suse.com/991809
CVE SUSE CVE CVE-2016-2815 page https://www.suse.com/security/cve/CVE-2016-2815/
CVE SUSE CVE CVE-2016-2818 page https://www.suse.com/security/cve/CVE-2016-2818/
CVE SUSE CVE CVE-2016-2819 page https://www.suse.com/security/cve/CVE-2016-2819/
CVE SUSE CVE CVE-2016-2821 page https://www.suse.com/security/cve/CVE-2016-2821/
CVE SUSE CVE CVE-2016-2822 page https://www.suse.com/security/cve/CVE-2016-2822/
CVE SUSE CVE CVE-2016-2824 page https://www.suse.com/security/cve/CVE-2016-2824/
CVE SUSE CVE CVE-2016-2828 page https://www.suse.com/security/cve/CVE-2016-2828/
CVE SUSE CVE CVE-2016-2830 page https://www.suse.com/security/cve/CVE-2016-2830/
CVE SUSE CVE CVE-2016-2831 page https://www.suse.com/security/cve/CVE-2016-2831/
CVE SUSE CVE CVE-2016-2834 page https://www.suse.com/security/cve/CVE-2016-2834/
CVE SUSE CVE CVE-2016-2835 page https://www.suse.com/security/cve/CVE-2016-2835/
CVE SUSE CVE CVE-2016-2836 page https://www.suse.com/security/cve/CVE-2016-2836/
CVE SUSE CVE CVE-2016-2837 page https://www.suse.com/security/cve/CVE-2016-2837/
CVE SUSE CVE CVE-2016-2838 page https://www.suse.com/security/cve/CVE-2016-2838/
CVE SUSE CVE CVE-2016-2839 page https://www.suse.com/security/cve/CVE-2016-2839/
CVE SUSE CVE CVE-2016-5252 page https://www.suse.com/security/cve/CVE-2016-5252/
CVE SUSE CVE CVE-2016-5254 page https://www.suse.com/security/cve/CVE-2016-5254/
CVE SUSE CVE CVE-2016-5258 page https://www.suse.com/security/cve/CVE-2016-5258/
CVE SUSE CVE CVE-2016-5259 page https://www.suse.com/security/cve/CVE-2016-5259/
CVE SUSE CVE CVE-2016-5262 page https://www.suse.com/security/cve/CVE-2016-5262/
CVE SUSE CVE CVE-2016-5263 page https://www.suse.com/security/cve/CVE-2016-5263/
CVE SUSE CVE CVE-2016-5264 page https://www.suse.com/security/cve/CVE-2016-5264/
CVE SUSE CVE CVE-2016-5265 page https://www.suse.com/security/cve/CVE-2016-5265/
CVE SUSE CVE CVE-2016-6354 page https://www.suse.com/security/cve/CVE-2016-6354/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/MozillaFirefox?arch=x86_64&distro=sles-11&sp=2 suse MozillaFirefox < 45.3.0esr-48.1 sles-11 x86_64
Affected pkg:rpm/suse/MozillaFirefox?arch=s390x&distro=sles-11&sp=2 suse MozillaFirefox < 45.3.0esr-48.1 sles-11 s390x
Affected pkg:rpm/suse/MozillaFirefox?arch=i586&distro=sles-11&sp=2 suse MozillaFirefox < 45.3.0esr-48.1 sles-11 i586
Affected pkg:rpm/suse/MozillaFirefox-translations?arch=x86_64&distro=sles-11&sp=2 suse MozillaFirefox-translations < 45.3.0esr-48.1 sles-11 x86_64
Affected pkg:rpm/suse/MozillaFirefox-translations?arch=s390x&distro=sles-11&sp=2 suse MozillaFirefox-translations < 45.3.0esr-48.1 sles-11 s390x
Affected pkg:rpm/suse/MozillaFirefox-translations?arch=i586&distro=sles-11&sp=2 suse MozillaFirefox-translations < 45.3.0esr-48.1 sles-11 i586
Affected pkg:rpm/suse/MozillaFirefox-branding-SLED?arch=x86_64&distro=sles-11&sp=2 suse MozillaFirefox-branding-SLED < 45.0-20.38 sles-11 x86_64
Affected pkg:rpm/suse/MozillaFirefox-branding-SLED?arch=s390x&distro=sles-11&sp=2 suse MozillaFirefox-branding-SLED < 45.0-20.38 sles-11 s390x
Affected pkg:rpm/suse/MozillaFirefox-branding-SLED?arch=i586&distro=sles-11&sp=2 suse MozillaFirefox-branding-SLED < 45.0-20.38 sles-11 i586
Affected pkg:rpm/suse/mozilla-nss?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nss < 3.21.1-26.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nss?arch=s390x&distro=sles-11&sp=2 suse mozilla-nss < 3.21.1-26.2 sles-11 s390x
Affected pkg:rpm/suse/mozilla-nss?arch=i586&distro=sles-11&sp=2 suse mozilla-nss < 3.21.1-26.2 sles-11 i586
Affected pkg:rpm/suse/mozilla-nss-tools?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nss-tools < 3.21.1-26.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nss-tools?arch=s390x&distro=sles-11&sp=2 suse mozilla-nss-tools < 3.21.1-26.2 sles-11 s390x
Affected pkg:rpm/suse/mozilla-nss-tools?arch=i586&distro=sles-11&sp=2 suse mozilla-nss-tools < 3.21.1-26.2 sles-11 i586
Affected pkg:rpm/suse/mozilla-nss-devel?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nss-devel < 3.21.1-26.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nss-devel?arch=s390x&distro=sles-11&sp=2 suse mozilla-nss-devel < 3.21.1-26.2 sles-11 s390x
Affected pkg:rpm/suse/mozilla-nss-devel?arch=i586&distro=sles-11&sp=2 suse mozilla-nss-devel < 3.21.1-26.2 sles-11 i586
Affected pkg:rpm/suse/mozilla-nss-32bit?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nss-32bit < 3.21.1-26.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nss-32bit?arch=s390x&distro=sles-11&sp=2 suse mozilla-nss-32bit < 3.21.1-26.2 sles-11 s390x
Affected pkg:rpm/suse/mozilla-nspr?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nspr < 4.12-25.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nspr?arch=s390x&distro=sles-11&sp=2 suse mozilla-nspr < 4.12-25.2 sles-11 s390x
Affected pkg:rpm/suse/mozilla-nspr?arch=i586&distro=sles-11&sp=2 suse mozilla-nspr < 4.12-25.2 sles-11 i586
Affected pkg:rpm/suse/mozilla-nspr-devel?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nspr-devel < 4.12-25.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nspr-devel?arch=s390x&distro=sles-11&sp=2 suse mozilla-nspr-devel < 4.12-25.2 sles-11 s390x
Affected pkg:rpm/suse/mozilla-nspr-devel?arch=i586&distro=sles-11&sp=2 suse mozilla-nspr-devel < 4.12-25.2 sles-11 i586
Affected pkg:rpm/suse/mozilla-nspr-32bit?arch=x86_64&distro=sles-11&sp=2 suse mozilla-nspr-32bit < 4.12-25.2 sles-11 x86_64
Affected pkg:rpm/suse/mozilla-nspr-32bit?arch=s390x&distro=sles-11&sp=2 suse mozilla-nspr-32bit < 4.12-25.2 sles-11 s390x
Affected pkg:rpm/suse/libfreebl3?arch=x86_64&distro=sles-11&sp=2 suse libfreebl3 < 3.21.1-26.2 sles-11 x86_64
Affected pkg:rpm/suse/libfreebl3?arch=s390x&distro=sles-11&sp=2 suse libfreebl3 < 3.21.1-26.2 sles-11 s390x
Affected pkg:rpm/suse/libfreebl3?arch=i586&distro=sles-11&sp=2 suse libfreebl3 < 3.21.1-26.2 sles-11 i586
Affected pkg:rpm/suse/libfreebl3-32bit?arch=x86_64&distro=sles-11&sp=2 suse libfreebl3-32bit < 3.21.1-26.2 sles-11 x86_64
Affected pkg:rpm/suse/libfreebl3-32bit?arch=s390x&distro=sles-11&sp=2 suse libfreebl3-32bit < 3.21.1-26.2 sles-11 s390x
Affected pkg:rpm/suse/firefox-fontconfig?arch=x86_64&distro=sles-11&sp=2 suse firefox-fontconfig < 2.11.0-4.2 sles-11 x86_64
Affected pkg:rpm/suse/firefox-fontconfig?arch=s390x&distro=sles-11&sp=2 suse firefox-fontconfig < 2.11.0-4.2 sles-11 s390x
Affected pkg:rpm/suse/firefox-fontconfig?arch=i586&distro=sles-11&sp=2 suse firefox-fontconfig < 2.11.0-4.2 sles-11 i586
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...