Errata overview
Errata ID 326
Date 2015-09-23
Source package firefox-de
Fixed in version 1:38.2.1esr-1.61.201509161413
Description
Multiple security vulnerabilities have been fixed in firefox-de:
* Memory safety bugs fixed in Firefox ESR 31.7 and Firefox 38.
  (CVE-2015-2708)
* heap-buffer-overflow (read of size 0xffffffff) when playing a m4v video
  (CVE-2015-0797)
* Heap-buffer-overflow in SVGTextFrame (CVE-2015-2710)
* Heap-use-after-free in SetBreaks (CVE-2015-2713)
* Buffer overflow xml parser (CVE-2015-2716)
* NSS incorrectly permits skipping of ServerKeyExchange (CVE-2015-2721)
* NSS accepts export-length DHE keys with regular DHE cipher suites
  (CVE-2015-4000)
* Privilege escalation in PDF.js (CVE-2015-2743)
* CairoTextureClientD3D9::BorrowDrawTarget using uninitialized memory
  (CVE-2015-2734)
* Memory safety bug due to bad test in nsZipArchive.cpp (CVE-2015-2735)
* nsZipArchive::BuildFileList has memory-safety bug (CVE-2015-2736)
* rx::d3d11::SetBufferData using uninitialized memory (CVE-2015-2737)
* YCbCrImageDataDeserializer::ToDataSourceSurface using uninitialized 
  memory (CVE-2015-2738)
* Memory safety problem in ArrayBufferBuilder::append (CVE-2015-2739)
* Overflow in nsXMLHttpRequest::AppendToResponseText causes memory-safety
  bug (CVE-2015-2740)
* Use After Free in CanonicalizeXPCOMParticipant (CVE-2015-2722)
* Use After Free in CanonicalizeXPCOMParticipant() with dedicated worker
  (CVE-2015-2733)
* ECC correctness issues (CVE-2015-2730)
* Type Confusion mozilla::dom::indexedDB::IndexedDatabaseManager
  (CVE-2015-2728)
* Memory safety bugs fixed in Firefox ESR 31.8, Firefox 38.1, and 
  Firefox 39. (CVE-2015-2724)
* Memory safety bugs fixed in Firefox 38.1 and Firefox 39. (CVE-2015-2725)
* Memory safety bugs fixed in Firefox 39. (CVE-2015-2726)
* out of bounds read at mozilla::AudioSink (CVE-2015-4475)
* JSON.parse with reviver allows redefining non-configurable properties
  (CVE-2015-4478)
* MPEG4 saio Chunk Integer Overflow (libstagefright) (CVE-2015-4479)
* crash in [@ stagefright::SampleTable::isValid() ] with h264 mp4
  (CVE-2015-4480)
* Out of bounds write in mar_read.c (CVE-2015-4482)
* crash in void js::jit::AssemblerX86Shared::lock_addl<js::jit::Imm32>
  (CVE-2015-4484)
* Heap-buffer-overflow WRITE in resize_context_buffers (CVE-2015-4485)
* Out of bounds read in decrease_ref_count (CVE-2015-4486)
* Overflow nsTSubstring::ReplacePrep causes memory-safety bugs in string
  library (CVE-2015-4487)
* StyleAnimationValue::operator= uses objects after delete on
  self-assignment (CVE-2015-4488)
* Self-assignment in nsTArray_Impl causes memory-safety bug (CVE-2015-4489)
* gdk-pixbuf heap overflow and DoS (CVE-2015-4491)
* Use After Free in XMLHttpRequest::Open() (CVE-2015-4492)
* Stagefright: heap-buffer-overflow crash 
  [@stagefright::ESDS::parseESDescriptor] (CVE-2015-4493)
* use-after-free (& crash) after style flush in CanvasRenderingContext2D
  (CVE-2015-4497)
* Mozilla Firefox nsIPresShell Use-After-Free Remote Code Execution
  Vulnerability
* Firefox Addon bypass dialog and spoof vulnerability (CVE-2015-4498)
Additional notes This update consists of two updates for firefox-en and firefox-de.
CVE ID CVE-2015-2708
CVE-2015-0797
CVE-2015-2710
CVE-2015-2713
CVE-2015-2716
CVE-2015-2721
CVE-2015-4000
CVE-2015-2743
CVE-2015-2734
CVE-2015-2735
CVE-2015-2736
CVE-2015-2737
CVE-2015-2738
CVE-2015-2739
CVE-2015-2740
CVE-2015-2722
CVE-2015-2733
CVE-2015-2730
CVE-2015-2728
CVE-2015-2724
CVE-2015-2725
CVE-2015-2726
CVE-2015-4475
CVE-2015-4478
CVE-2015-4479
CVE-2015-4480
CVE-2015-4482
CVE-2015-4484
CVE-2015-4485
CVE-2015-4486
CVE-2015-4487
CVE-2015-4488
CVE-2015-4489
CVE-2015-4491
CVE-2015-4492
CVE-2015-4493
CVE-2015-4497
CVE-2015-4498
UCS Bug number #38523