Mailinglist Archive: opensuse-updates (113 mails)

< Previous Next >
openSUSE-SU-2014:1655-1: moderate: Security update for seamonkey
openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:1655-1
Rating: moderate
References: #894370 #900639 #900941 #908009
Cross-References: CVE-2014-1574 CVE-2014-1575 CVE-2014-1576
CVE-2014-1577 CVE-2014-1578 CVE-2014-1580
CVE-2014-1581 CVE-2014-1582 CVE-2014-1583
CVE-2014-1584 CVE-2014-1585 CVE-2014-1586
CVE-2014-1587 CVE-2014-1588 CVE-2014-1589
CVE-2014-1590 CVE-2014-1591 CVE-2014-1592
CVE-2014-1593 CVE-2014-1594
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes 20 vulnerabilities is now available.

Description:

seamonkey was updated to version 2.31 to fix 20 security issues.

These security issues were fixed:
- Miscellaneous memory safety hazards (CVE-2014-1587, CVE-2014-1588).
- XBL bindings accessible via improper CSS declarations (CVE-2014-1589).
- XMLHttpRequest crashes with some input streams (CVE-2014-1590).
- CSP leaks redirect data via violation reports (CVE-2014-1591).
- Use-after-free during HTML5 parsing (CVE-2014-1592).
- Buffer overflow while parsing media content (CVE-2014-1593).
- Bad casting from the BasicThebesLayer to BasicContainerLayer
(CVE-2014-1594).
- Miscellaneous memory safety hazards (CVE-2014-1574, CVE-2014-1575).
- Buffer overflow during CSS manipulation (CVE-2014-1576).
- Web Audio memory corruption issues with custom waveforms (CVE-2014-1577).
- Out-of-bounds write with WebM video (CVE-2014-1578).
- Further uninitialized memory use during GIF rendering (CVE-2014-1580).
- Use-after-free interacting with text directionality (CVE-2014-1581).
- Key pinning bypasses (CVE-2014-1582, CVE-2014-1584).
- Inconsistent video sharing within iframe (CVE-2014-1585, CVE-2014-1586).
- Accessing cross-origin objects via the Alarms API (only relevant for
installed web apps) (CVE-2014-1583).

This non-security issue was fixed:
- define /usr/share/myspell as additional dictionary location and remove
add-plugins.sh finally (bnc#900639).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2014-784

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

seamonkey-2.31-4.2
seamonkey-debuginfo-2.31-4.2
seamonkey-debugsource-2.31-4.2
seamonkey-dom-inspector-2.31-4.2
seamonkey-irc-2.31-4.2
seamonkey-translations-common-2.31-4.2
seamonkey-translations-other-2.31-4.2


References:

http://support.novell.com/security/cve/CVE-2014-1574.html
http://support.novell.com/security/cve/CVE-2014-1575.html
http://support.novell.com/security/cve/CVE-2014-1576.html
http://support.novell.com/security/cve/CVE-2014-1577.html
http://support.novell.com/security/cve/CVE-2014-1578.html
http://support.novell.com/security/cve/CVE-2014-1580.html
http://support.novell.com/security/cve/CVE-2014-1581.html
http://support.novell.com/security/cve/CVE-2014-1582.html
http://support.novell.com/security/cve/CVE-2014-1583.html
http://support.novell.com/security/cve/CVE-2014-1584.html
http://support.novell.com/security/cve/CVE-2014-1585.html
http://support.novell.com/security/cve/CVE-2014-1586.html
http://support.novell.com/security/cve/CVE-2014-1587.html
http://support.novell.com/security/cve/CVE-2014-1588.html
http://support.novell.com/security/cve/CVE-2014-1589.html
http://support.novell.com/security/cve/CVE-2014-1590.html
http://support.novell.com/security/cve/CVE-2014-1591.html
http://support.novell.com/security/cve/CVE-2014-1592.html
http://support.novell.com/security/cve/CVE-2014-1593.html
http://support.novell.com/security/cve/CVE-2014-1594.html
https://bugzilla.suse.com/show_bug.cgi?id=894370
https://bugzilla.suse.com/show_bug.cgi?id=900639
https://bugzilla.suse.com/show_bug.cgi?id=900941
https://bugzilla.suse.com/show_bug.cgi?id=908009


< Previous Next >
This Thread
  • No further messages