SUSE SLES11 Security Update : MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr / mozilla-nss (SUSE-SU-2016:2061-1)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and
mozilla-nss were updated to fix nine security issues. Mozilla Firefox
was updated to version 45.3.0 ESR. mozilla-nss was updated to version
3.21.1, mozilla-nspr to version 4.12. These security issues were fixed
in 45.3.0ESR :

- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety
hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)

- CVE-2016-2830: Favicon network connection can persist
when page is closed (MFSA 2016-63)

- CVE-2016-2838: Buffer overflow rendering SVG with
bidirectional content (MFSA 2016-64)

- CVE-2016-2839: Cairo rendering crash due to memory
allocation issue with FFmpeg 0.10 (MFSA 2016-65)

- CVE-2016-5252: Stack underflow during 2D graphics
rendering (MFSA 2016-67)

- CVE-2016-5254: Use-after-free when using alt key and
toplevel menus (MFSA 2016-70)

- CVE-2016-5258: Use-after-free in DTLS during WebRTC
session shutdown (MFSA 2016-72)

- CVE-2016-5259: Use-after-free in service workers with
nested sync events (MFSA 2016-73)

- CVE-2016-5262: Scripts on marquee tag can execute in
sandboxed iframes (MFSA 2016-76)

- CVE-2016-2837: Buffer overflow in ClearKey Content
Decryption Module (CDM) during video playback (MFSA
2016-77)

- CVE-2016-5263: Type confusion in display transformation
(MFSA 2016-78)

- CVE-2016-5264: Use-after-free when applying SVG effects
(MFSA 2016-79)

- CVE-2016-5265: Same-origin policy violation using local
HTML file and saved shortcut file (MFSA 2016-80)

- CVE-2016-6354: Fix for possible buffer overrun
(bsc#990856) Security issues fixed in 45.2.0.ESR :

- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61)
(bsc#983639).

- CVE-2016-2824: Out-of-bounds write with WebGL shader
(MFSA 2016-53) (bsc#983651).

- CVE-2016-2822: Addressbar spoofing though the SELECT
element (MFSA 2016-52) (bsc#983652).

- CVE-2016-2821: Use-after-free deleting tables from a
contenteditable document (MFSA 2016-51) (bsc#983653).

- CVE-2016-2819: Buffer overflow parsing HTML5 fragments
(MFSA 2016-50) (bsc#983655).

- CVE-2016-2828: Use-after-free when textures are used in
WebGL operations after recycle pool destruction (MFSA
2016-56) (bsc#983646).

- CVE-2016-2831: Entering fullscreen and persistent
pointerlock without user permission (MFSA 2016-58)
(bsc#983643).

- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory
safety hazards (MFSA 2016-49) (bsc#983638) These
non-security issues were fixed :

- Fix crashes on aarch64

- Determine page size at runtime (bsc#984006)

- Allow aarch64 to work in safe mode (bsc#985659)

- Fix crashes on mainframes

- Temporarily bind Firefox to the first CPU as a hotfix
for an apparent race condition (bsc#989196, bsc#990628)
All extensions must now be signed by addons.mozilla.org.
Please read README.SUSE for more details.

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/983549
https://bugzilla.suse.com/983638
https://bugzilla.suse.com/983639
https://bugzilla.suse.com/983643
https://bugzilla.suse.com/983646
https://bugzilla.suse.com/983651
https://bugzilla.suse.com/983652
https://bugzilla.suse.com/983653
https://bugzilla.suse.com/983655
https://bugzilla.suse.com/984006
https://bugzilla.suse.com/985659
https://bugzilla.suse.com/989196
https://bugzilla.suse.com/990628
https://bugzilla.suse.com/990856
https://bugzilla.suse.com/991809
https://www.suse.com/security/cve/CVE-2016-2815.html
https://www.suse.com/security/cve/CVE-2016-2818.html
https://www.suse.com/security/cve/CVE-2016-2819.html
https://www.suse.com/security/cve/CVE-2016-2821.html
https://www.suse.com/security/cve/CVE-2016-2822.html
https://www.suse.com/security/cve/CVE-2016-2824.html
https://www.suse.com/security/cve/CVE-2016-2828.html
https://www.suse.com/security/cve/CVE-2016-2830.html
https://www.suse.com/security/cve/CVE-2016-2831.html
https://www.suse.com/security/cve/CVE-2016-2834.html
https://www.suse.com/security/cve/CVE-2016-2835.html
https://www.suse.com/security/cve/CVE-2016-2836.html
https://www.suse.com/security/cve/CVE-2016-2837.html
https://www.suse.com/security/cve/CVE-2016-2838.html
https://www.suse.com/security/cve/CVE-2016-2839.html
https://www.suse.com/security/cve/CVE-2016-5252.html
https://www.suse.com/security/cve/CVE-2016-5254.html
https://www.suse.com/security/cve/CVE-2016-5258.html
https://www.suse.com/security/cve/CVE-2016-5259.html
https://www.suse.com/security/cve/CVE-2016-5262.html
https://www.suse.com/security/cve/CVE-2016-5263.html
https://www.suse.com/security/cve/CVE-2016-5264.html
https://www.suse.com/security/cve/CVE-2016-5265.html
https://www.suse.com/security/cve/CVE-2016-6354.html
http://www.nessus.org/u?b01d3fea

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 11-SP2-LTSS:zypper in -t patch
slessp2-MozillaFirefox-12690=1

SUSE Linux Enterprise Debuginfo 11-SP2:zypper in -t patch
dbgsp2-MozillaFirefox-12690=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.5
(CVSS2#E:U/RL:ND/RC:UR)
Public Exploit Available : false