File _patchinfo of Package patchinfo.317
<patchinfo incident="317">
<issue id="910669" tracker="bnc">MozillaFirefox 35/31.4.0 security release</issue>
<issue id="909563" tracker="bnc">MozillaFirefox displays error messages for addons.xpi during startup from terminal.</issue>
<issue id="910647" tracker="bnc"></issue>
<issue id="CVE-2014-8641" tracker="cve" />
<issue id="CVE-2014-8639" tracker="cve" />
<issue id="CVE-2014-8638" tracker="cve" />
<issue id="CVE-2014-8635" tracker="cve" />
<issue id="CVE-2014-8634" tracker="cve" />
<issue id="CVE-2014-1569" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>pcerny</packager>
<description>
This update fixes the following security issues in MozillaFirefox:
- MFSA 2015-01/CVE-2014-8634/CVE-2014-8635
(bmo#1109889, bmo#1111737, bmo#1026774, bmo#1027300,
bmo#1054538, bmo#1067473, bmo#1070962, bmo#1072130,
bmo#1072871, bmo#1098583)
Miscellaneous memory safety hazards (rv:35.0 / rv:31.4)
- MFSA 2015-03/CVE-2014-8638
(bmo#1080987)
sendBeacon requests lack an Origin header
- MFSA 2015-04/CVE-2014-8639
(bmo#1095859)
Cookie injection through Proxy Authenticate responses
- MFSA 2015-06/CVE-2014-8641
(bmo#1108455)
Read-after-free in WebRTC
Also Mozilla NSS was updated to 3.17.3 to fix:
* The QuickDER decoder now decodes lengths robustly
(bmo#1064670/CVE-2014-1569)
* Support for TLS_FALLBACK_SCSV has been added to the ssltap
and tstclnt utilities
* Changes in CA certificates
</description>
<summary>Security update for MozillaFirefox</summary>
</patchinfo>