{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"31.5.3esr-27.1","MozillaFirefox-translations":"31.5.3esr-27.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"31.5.3esr-27.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"31.5.3esr-27.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"31.5.3esr-27.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"31.5.3esr-27.1","MozillaFirefox-translations":"31.5.3esr-27.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"31.5.3esr-27.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"31.5.3esr-27.1","MozillaFirefox-translations":"31.5.3esr-27.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"31.5.3esr-27.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"MozillaFirefox was updated to the 31.5.3ESR release to fix two security vulnerabilities:\n\nMFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitary code execution on the local system.\n\nMFSA 2015-28 / CVE-2015-0818:\nSecurity researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation.\n","id":"SUSE-SU-2015:0630-1","modified":"2015-03-24T17:10:32Z","published":"2015-03-24T17:10:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20150630-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/923534"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-0817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-0818"}],"related":["CVE-2015-0817","CVE-2015-0818"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2015-0817","CVE-2015-0818"]}