Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2017:1669-1: important: Security update for MozillaFirefox, MozillaFirefox-branding-SLE

Recommended Posts

SUSE Security Update: Security update for MozillaFirefox, MozillaFirefox-branding-SLE

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2017:1669-1

Rating: important

References: #1035082 #1043960

Cross-References: CVE-2016-10196 CVE-2017-5429 CVE-2017-5430

CVE-2017-5432 CVE-2017-5433 CVE-2017-5434

CVE-2017-5435 CVE-2017-5436 CVE-2017-5438

CVE-2017-5439 CVE-2017-5440 CVE-2017-5441

CVE-2017-5442 CVE-2017-5443 CVE-2017-5444

CVE-2017-5445 CVE-2017-5446 CVE-2017-5447

CVE-2017-5448 CVE-2017-5449 CVE-2017-5451

CVE-2017-5454 CVE-2017-5455 CVE-2017-5456

CVE-2017-5459 CVE-2017-5460 CVE-2017-5461

CVE-2017-5462 CVE-2017-5464 CVE-2017-5465

CVE-2017-5466 CVE-2017-5467 CVE-2017-5469

CVE-2017-5470 CVE-2017-5472 CVE-2017-7749

CVE-2017-7750 CVE-2017-7751 CVE-2017-7752

CVE-2017-7754 CVE-2017-7755 CVE-2017-7756

CVE-2017-7757 CVE-2017-7758 CVE-2017-7761

CVE-2017-7763 CVE-2017-7764 CVE-2017-7765

CVE-2017-7768 CVE-2017-7778

Affected Products:

SUSE OpenStack Cloud 6

SUSE Linux Enterprise Software Development Kit 12-SP2

SUSE Linux Enterprise Server for SAP 12-SP1

SUSE Linux Enterprise Server for SAP 12

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2

SUSE Linux Enterprise Server 12-SP2

SUSE Linux Enterprise Server 12-SP1-LTSS

SUSE Linux Enterprise Server 12-LTSS

SUSE Linux Enterprise Desktop 12-SP2

______________________________________________________________________________

 

An update that fixes 50 vulnerabilities is now available.

 

Description:

 

The MozillaFirefox was updated to the new ESR 52.2 release, which fixes

the following issues (bsc#1043960):

 

* MFSA 2017-16/CVE-2017-7758 Out-of-bounds read in Opus encoder

* MFSA 2017-16/CVE-2017-7749 Use-after-free during docshell reloading

* MFSA 2017-16/CVE-2017-7751 Use-after-free with content viewer listeners

* MFSA 2017-16/CVE-2017-5472 Use-after-free using destroyed node when

regenerating trees

* MFSA 2017-16/CVE-2017-5470 Memory safety bugs fixed in Firefox 54 and

Firefox ESR 52.2

* MFSA 2017-16/CVE-2017-7752 Use-after-free with IME input

* MFSA 2017-16/CVE-2017-7750 Use-after-free with track elements

* MFSA 2017-16/CVE-2017-7768 32 byte arbitrary file read through Mozilla

Maintenance Service

* MFSA 2017-16/CVE-2017-7778 Vulnerabilities in the Graphite 2 library

* MFSA 2017-16/CVE-2017-7754 Out-of-bounds read in WebGL with ImageInfo

object

* MFSA 2017-16/CVE-2017-7755 Privilege escalation through Firefox

Installer with same directory DLL files

* MFSA 2017-16/CVE-2017-7756 Use-after-free and use-after-scope logging

XHR header errors

* MFSA 2017-16/CVE-2017-7757 Use-after-free in IndexedDB

* MFSA 2017-16/CVE-2017-7761 File deletion and privilege escalation

through Mozilla Maintenance Service helper.exe application

* MFSA 2017-16/CVE-2017-7763 Mac fonts render some unicode characters as

spaces

* MFSA 2017-16/CVE-2017-7765 Mark of the Web bypass when saving executable

files

* MFSA 2017-16/CVE-2017-7764 (bmo#1364283,

bmo#http://www.unicode.org/reports/tr31/tr31-26

.html#Aspirational_Use_Scripts) Domain spoofing with combination of

Canadian Syllabics and

other unicode blocks

 

- update to Firefox ESR 52.1 (bsc#1035082)

* MFSA 2017-12/CVE-2016-10196 Vulnerabilities in Libevent library

* MFSA 2017-12/CVE-2017-5443 Out-of-bounds write during BinHex decoding

* MFSA 2017-12/CVE-2017-5429 Memory safety bugs fixed in Firefox 53,

Firefox ESR 45.9, and Firefox ESR 52.1

* MFSA 2017-12/CVE-2017-5464 Memory corruption with accessibility and DOM

manipulation

* MFSA 2017-12/CVE-2017-5465 Out-of-bounds read in ConvolvePixel

* MFSA 2017-12/CVE-2017-5466 Origin confusion when reloading isolated

data:text/html URL

* MFSA 2017-12/CVE-2017-5467 Memory corruption when drawing Skia content

* MFSA 2017-12/CVE-2017-5460 Use-after-free in frame selection

* MFSA 2017-12/CVE-2017-5461 Out-of-bounds write in Base64 encoding in NSS

* MFSA 2017-12/CVE-2017-5448 Out-of-bounds write in ClearKeyDecryptor

* MFSA 2017-12/CVE-2017-5449 Crash during bidirectional unicode

manipulation with animation

* MFSA 2017-12/CVE-2017-5446 Out-of-bounds read when HTTP/2 DATA frames

are sent with incorrect data

* MFSA 2017-12/CVE-2017-5447 Out-of-bounds read during glyph processing

* MFSA 2017-12/CVE-2017-5444 Buffer overflow while parsing

application/http-index-format content

* MFSA 2017-12/CVE-2017-5445 Uninitialized values used while parsing

application/http- index-format content

* MFSA 2017-12/CVE-2017-5442 Use-after-free during style changes

* MFSA 2017-12/CVE-2017-5469 Potential Buffer overflow in flex-generated

code

* MFSA 2017-12/CVE-2017-5440 Use-after-free in txExecutionState destructor

during XSLT processing

* MFSA 2017-12/CVE-2017-5441 Use-after-free with selection during scroll

events

* MFSA 2017-12/CVE-2017-5439 Use-after-free in nsTArray Length() during

XSLT processing

* MFSA 2017-12/CVE-2017-5438 Use-after-free in nsAutoPtr during XSLT

processing

* MFSA 2017-12/CVE-2017-5436 Out-of-bounds write with malicious font in

Graphite 2

* MFSA 2017-12/CVE-2017-5435 Use-after-free during transaction processing

in the editor

* MFSA 2017-12/CVE-2017-5434 Use-after-free during focus handling

* MFSA 2017-12/CVE-2017-5433 Use-after-free in SMIL animation functions

* MFSA 2017-12/CVE-2017-5432 Use-after-free in text input selection

* MFSA 2017-12/CVE-2017-5430 Memory safety bugs fixed in Firefox 53 and

Firefox ESR 52.1

* MFSA 2017-12/CVE-2017-5459 Buffer overflow in WebGL

* MFSA 2017-12/CVE-2017-5462 DRBG flaw in NSS

* MFSA 2017-12/CVE-2017-5455 Sandbox escape through internal feed reader

APIs

* MFSA 2017-12/CVE-2017-5454 Sandbox escape allowing file system read

access through file picker

* MFSA 2017-12/CVE-2017-5456 Sandbox escape allowing local file system

access

* MFSA 2017-12/CVE-2017-5451 Addressbar spoofing with onblur event

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE OpenStack Cloud 6:

 

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1035=1

 

- SUSE Linux Enterprise Software Development Kit 12-SP2:

 

zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1035=1

 

- SUSE Linux Enterprise Server for SAP 12-SP1:

 

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1035=1

 

- SUSE Linux Enterprise Server for SAP 12:

 

zypper in -t patch SUSE-SLE-SAP-12-2017-1035=1

 

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

 

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1035=1

 

- SUSE Linux Enterprise Server 12-SP2:

 

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1035=1

 

- SUSE Linux Enterprise Server 12-SP1-LTSS:

 

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1035=1

 

- SUSE Linux Enterprise Server 12-LTSS:

 

zypper in -t patch SUSE-SLE-SERVER-12-2017-1035=1

 

- SUSE Linux Enterprise Desktop 12-SP2:

 

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1035=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE OpenStack Cloud 6 (x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-devel-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

 

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-devel-52.2.0esr-108.3

 

- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-devel-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Server for SAP 12 (x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-devel-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-devel-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-devel-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

 

MozillaFirefox-52.2.0esr-108.3

MozillaFirefox-branding-SLE-52-31.1

MozillaFirefox-debuginfo-52.2.0esr-108.3

MozillaFirefox-debugsource-52.2.0esr-108.3

MozillaFirefox-translations-52.2.0esr-108.3

 

 

References:

 

https://www.suse.com/security/cve/CVE-2016-10196.html

https://www.suse.com/security/cve/CVE-2017-5429.html

https://www.suse.com/security/cve/CVE-2017-5430.html

https://www.suse.com/security/cve/CVE-2017-5432.html

https://www.suse.com/security/cve/CVE-2017-5433.html

https://www.suse.com/security/cve/CVE-2017-5434.html

https://www.suse.com/security/cve/CVE-2017-5435.html

https://www.suse.com/security/cve/CVE-2017-5436.html

https://www.suse.com/security/cve/CVE-2017-5438.html

https://www.suse.com/security/cve/CVE-2017-5439.html

https://www.suse.com/security/cve/CVE-2017-5440.html

https://www.suse.com/security/cve/CVE-2017-5441.html

https://www.suse.com/security/cve/CVE-2017-5442.html

https://www.suse.com/security/cve/CVE-2017-5443.html

https://www.suse.com/security/cve/CVE-2017-5444.html

https://www.suse.com/security/cve/CVE-2017-5445.html

https://www.suse.com/security/cve/CVE-2017-5446.html

https://www.suse.com/security/cve/CVE-2017-5447.html

https://www.suse.com/security/cve/CVE-2017-5448.html

https://www.suse.com/security/cve/CVE-2017-5449.html

https://www.suse.com/security/cve/CVE-2017-5451.html

https://www.suse.com/security/cve/CVE-2017-5454.html

https://www.suse.com/security/cve/CVE-2017-5455.html

https://www.suse.com/security/cve/CVE-2017-5456.html

https://www.suse.com/security/cve/CVE-2017-5459.html

https://www.suse.com/security/cve/CVE-2017-5460.html

https://www.suse.com/security/cve/CVE-2017-5461.html

https://www.suse.com/security/cve/CVE-2017-5462.html

https://www.suse.com/security/cve/CVE-2017-5464.html

https://www.suse.com/security/cve/CVE-2017-5465.html

https://www.suse.com/security/cve/CVE-2017-5466.html

https://www.suse.com/security/cve/CVE-2017-5467.html

https://www.suse.com/security/cve/CVE-2017-5469.html

https://www.suse.com/security/cve/CVE-2017-5470.html

https://www.suse.com/security/cve/CVE-2017-5472.html

https://www.suse.com/security/cve/CVE-2017-7749.html

https://www.suse.com/security/cve/CVE-2017-7750.html

https://www.suse.com/security/cve/CVE-2017-7751.html

https://www.suse.com/security/cve/CVE-2017-7752.html

https://www.suse.com/security/cve/CVE-2017-7754.html

https://www.suse.com/security/cve/CVE-2017-7755.html

https://www.suse.com/security/cve/CVE-2017-7756.html

https://www.suse.com/security/cve/CVE-2017-7757.html

https://www.suse.com/security/cve/CVE-2017-7758.html

https://www.suse.com/security/cve/CVE-2017-7761.html

https://www.suse.com/security/cve/CVE-2017-7763.html

https://www.suse.com/security/cve/CVE-2017-7764.html

https://www.suse.com/security/cve/CVE-2017-7765.html

https://www.suse.com/security/cve/CVE-2017-7768.html

https://www.suse.com/security/cve/CVE-2017-7778.html

https://bugzilla.suse.com/1035082

https://bugzilla.suse.com/1043960

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×