File _patchinfo of Package patchinfo.7325

<patchinfo incident="7325">
  <issue id="1060445" tracker="bnc">VUL-0: MozillaFirefox 56 / 52.4.0esr security release</issue>
  <issue id="2017-7805" tracker="cve" />
  <issue tracker="cve" id="2017-7793"></issue>
  <issue tracker="cve" id="2017-7818"></issue>
  <issue tracker="cve" id="2017-7819"></issue>
  <issue tracker="cve" id="2017-7824"></issue>
  <issue tracker="cve" id="2017-7814"></issue>
  <issue tracker="cve" id="2017-7823"></issue>
  <issue tracker="cve" id="2017-7810"></issue>
  <issue tracker="bnc" id="1061005"/>
  <category>security</category>
  <rating>important</rating>
  <packager>wrosenauer</packager>
  <description>This update to Mozilla Firefox 52.4esr, along with Mozilla NSS 3.28.6, fixes security issues and bugs.
    
The following vulnerabilities advised upstream under MFSA 2017-22 (boo#1060445) were fixed:
    
- CVE-2017-7793: Use-after-free with Fetch API
- CVE-2017-7818: Use-after-free during ARIA array manipulation
- CVE-2017-7819: Use-after-free while resizing images in design mode
- CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
- CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings
- CVE-2017-7823: CSP sandbox directive did not create a unique origin
- CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
    
The following security issue was fixed in Mozilla NSS 3.28.6: 

- CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005)

The following bug was fixed:

- boo#1029917: language accept header use incorrect locale

For compatibility reasons, java-1_8_0-openjdk was rebuilt to the updated version of NSS.
</description>
  <summary>Security update for Mozilla Firefox and NSS</summary>
</patchinfo>
openSUSE Build Service is sponsored by