<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0607-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-03-22T15:28:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-03-22T15:28:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-03-22T15:28:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">MozillaFirefox was updated to Firefox 36.0.4 to fix two critical security issues found during Pwn2Own:

  * MFSA 2015-28/CVE-2015-0818 (bmo#1144988)
    Privilege escalation through SVG navigation

  * MFSA 2015-29/CVE-2015-0817 (bmo#1145255)
    Code execution through incorrect JavaScript bounds checking
    elimination

Als fixed were the following bugs:
- Copy the icons to /usr/share/icons instead of symlinking them:
  in preparation for containerized apps (e.g. xdg-app) as well as
  AppStream metadata extraction, there are a couple locations that
  need to be real files for system integration (.desktop files,
  icons, mime-type info).

- update to Firefox 36.0.1
  Bugfixes:
  * Disable the usage of the ANY DNS query type (bmo#1093983)
  * Hello may become inactive until restart (bmo#1137469)
  * Print preferences may not be preserved (bmo#1136855)
  * Hello contact tabs may not be visible (bmo#1137141)
  * Accept hostnames that include an underscore character ('_')
    (bmo#1136616)
  * WebGL may use significant memory with Canvas2d (bmo#1137251)
  * Option -remote has been restored (bmo#1080319)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0607-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-36.0.4-63.1">
      <FullProductName ProductID="MozillaFirefox-36.0.4-63.1">MozillaFirefox-36.0.4-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-36.0.4-63.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-36.0.4-63.1">MozillaFirefox-branding-upstream-36.0.4-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-36.0.4-63.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-36.0.4-63.1">MozillaFirefox-buildsymbols-36.0.4-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-36.0.4-63.1">
      <FullProductName ProductID="MozillaFirefox-devel-36.0.4-63.1">MozillaFirefox-devel-36.0.4-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-36.0.4-63.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-36.0.4-63.1">MozillaFirefox-translations-common-36.0.4-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-36.0.4-63.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-36.0.4-63.1">MozillaFirefox-translations-other-36.0.4-63.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.</Note>
    </Notes>
    <CVE>CVE-2015-0817</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0817.html</URL>
        <Description>CVE-2015-0817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923495</URL>
        <Description>SUSE Bug 923495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.</Note>
    </Notes>
    <CVE>CVE-2015-0818</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0818.html</URL>
        <Description>CVE-2015-0818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923495</URL>
        <Description>SUSE Bug 923495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
