Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.851290 |
Kategorie: | SuSE Local Security Checks |
Titel: | openSUSE: Security Advisory for Security (openSUSE-SU-2016:1211-1) |
Zusammenfassung: | The remote host is missing an update for the 'Security'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'Security' package(s) announced via the referenced advisory. Vulnerability Insight: This update to Mozilla Firefox 46.0 fixes several security issues and bugs (boo#977333). The following vulnerabilities were fixed: - CVE-2016-2804: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977373) - CVE-2016-2806: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977375) - CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977376) - CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (boo#977386) - CVE-2016-2811: Use-after-free in Service Worker - MFSA 2016-42 (boo#977379) - CVE-2016-2812: Buffer overflow in Service Worker - MFSA 2016-42 (boo#977379) - CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (boo#977381) - CVE-2016-2816: CSP not applied to pages sent with multipart/x-mixed-replace - MFSA 2016-45 (boo#977382) - CVE-2016-2817: Elevation of privilege with chrome.tabs.update API in web extensions - MFSA 2016-46 (boo#977384) - CVE-2016-2820: Firefox Health Reports could accept events from untrusted domains - MFSA 2016-48 (boo#977388) The following miscellaneous changes are included: - Improved security of the JavaScript Just In Time (JIT) Compiler - WebRTC fixes to improve performance and stability - Added support for document.elementsFromPoint - Added HKDF support for Web Crypto API The following changes from Mozilla Firefox 45.0.2 are included: - Fix an issue impacting the cookie header when third-party cookies are blocked - Fix a web compatibility regression impacting the srcset attribute of the image tag - Fix a crash impacting the video playback with Media Source Extension - Fix a regression impacting some specific uploads - Fix a regression with the copy and paste with some old versions of some Gecko applications like Thunderbird The following changes from Mozilla Firefox 45.0.2 are included: - Fix a regression causing search engine settings to be lost in some context - Bring back non-standard jar: URIs to fix a regression in IBM iNotes - XSLTProcessor.importStylesheet was failing when import was used - Fix an issue which could cause the list of search provider to be empty - Fix a regression when using the location bar (bmo#1254503) - Fix some loading issues when Accept third-party cookies: was set to Never - Disabled Graphite font shaping library The minimum requirements increased to NSPR 4.12 and NSS 3.22.3. Mozilla NSS was updated to 3.22.3 as a dependency for Mozilla Firefox 46.0, with the following changes: - Increase compatibility of TLS ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: Security on openSUSE Leap 42.1, openSUSE 13.2 Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-2804 https://security.gentoo.org/glsa/201701-15 http://www.securitytracker.com/id/1035692 SuSE Security Announcement: openSUSE-SU-2016:1211 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html SuSE Security Announcement: openSUSE-SU-2016:1251 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html http://www.ubuntu.com/usn/USN-2936-1 http://www.ubuntu.com/usn/USN-2936-2 http://www.ubuntu.com/usn/USN-2936-3 Common Vulnerability Exposure (CVE) ID: CVE-2016-2806 Debian Security Information: DSA-3601 (Google Search) http://www.debian.org/security/2016/dsa-3601 RedHat Security Advisories: RHSA-2016:0695 http://rhn.redhat.com/errata/RHSA-2016-0695.html SuSE Security Announcement: openSUSE-SU-2016:1767 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html SuSE Security Announcement: openSUSE-SU-2016:1769 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html SuSE Security Announcement: openSUSE-SU-2016:1778 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html Common Vulnerability Exposure (CVE) ID: CVE-2016-2807 Debian Security Information: DSA-3559 (Google Search) http://www.debian.org/security/2016/dsa-3559 Debian Security Information: DSA-3576 (Google Search) http://www.debian.org/security/2016/dsa-3576 RedHat Security Advisories: RHSA-2016:1041 http://rhn.redhat.com/errata/RHSA-2016-1041.html SuSE Security Announcement: SUSE-SU-2016:1258 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html SuSE Security Announcement: SUSE-SU-2016:1352 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html SuSE Security Announcement: SUSE-SU-2016:1374 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html http://www.ubuntu.com/usn/USN-2973-1 Common Vulnerability Exposure (CVE) ID: CVE-2016-2808 Common Vulnerability Exposure (CVE) ID: CVE-2016-2811 Common Vulnerability Exposure (CVE) ID: CVE-2016-2812 Common Vulnerability Exposure (CVE) ID: CVE-2016-2814 Common Vulnerability Exposure (CVE) ID: CVE-2016-2816 Common Vulnerability Exposure (CVE) ID: CVE-2016-2817 Common Vulnerability Exposure (CVE) ID: CVE-2016-2820 |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |