openSUSE Security Update: seamonkey: Update fixes nine security issues ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0855-1 Rating: moderate References: #881874 Cross-References: CVE-2014-1533 CVE-2014-1534 CVE-2014-1536 CVE-2014-1537 CVE-2014-1538 CVE-2014-1539 CVE-2014-1540 CVE-2014-1541 CVE-2014-1542 CVE-2014-1543 CVE-2014-1545 Affected Products: openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: seamonkey was updated to version 2.26.1 to fix nine security issues. These security issues were fixed: * Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534) * Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538) * Use-after-free in Event Listener Manager (CVE-2014-1540) * Use-after-free with SMIL Animation Controller (CVE-2014-1541) * Buffer overflow in Web Audio Speex resampler (CVE-2014-1542) * Out of bounds write in NSPR (CVE-2014-1545) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-448 - openSUSE 12.3: zypper in -t patch openSUSE-2014-448 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): seamonkey-2.26.1-28.3 seamonkey-debuginfo-2.26.1-28.3 seamonkey-debugsource-2.26.1-28.3 seamonkey-dom-inspector-2.26.1-28.3 seamonkey-irc-2.26.1-28.3 seamonkey-translations-common-2.26.1-28.3 seamonkey-translations-other-2.26.1-28.3 seamonkey-venkman-2.26.1-28.3 - openSUSE 12.3 (i586 x86_64): seamonkey-2.26.1-1.53.3 seamonkey-debuginfo-2.26.1-1.53.3 seamonkey-debugsource-2.26.1-1.53.3 seamonkey-dom-inspector-2.26.1-1.53.3 seamonkey-irc-2.26.1-1.53.3 seamonkey-translations-common-2.26.1-1.53.3 seamonkey-translations-other-2.26.1-1.53.3 seamonkey-venkman-2.26.1-1.53.3 References: http://support.novell.com/security/cve/CVE-2014-1533.html http://support.novell.com/security/cve/CVE-2014-1534.html http://support.novell.com/security/cve/CVE-2014-1536.html http://support.novell.com/security/cve/CVE-2014-1537.html http://support.novell.com/security/cve/CVE-2014-1538.html http://support.novell.com/security/cve/CVE-2014-1539.html http://support.novell.com/security/cve/CVE-2014-1540.html http://support.novell.com/security/cve/CVE-2014-1541.html http://support.novell.com/security/cve/CVE-2014-1542.html http://support.novell.com/security/cve/CVE-2014-1543.html http://support.novell.com/security/cve/CVE-2014-1545.html https://bugzilla.novell.com/881874