Mailinglist Archive: opensuse-updates (113 mails)

< Previous Next >
openSUSE-SU-2014:1655-1: moderate: Security update for seamonkey
openSUSE Security Update: Security update for seamonkey

Announcement ID: openSUSE-SU-2014:1655-1
Rating: moderate
References: #894370 #900639 #900941 #908009
Cross-References: CVE-2014-1574 CVE-2014-1575 CVE-2014-1576
CVE-2014-1577 CVE-2014-1578 CVE-2014-1580
CVE-2014-1581 CVE-2014-1582 CVE-2014-1583
CVE-2014-1584 CVE-2014-1585 CVE-2014-1586
CVE-2014-1587 CVE-2014-1588 CVE-2014-1589
CVE-2014-1590 CVE-2014-1591 CVE-2014-1592
CVE-2014-1593 CVE-2014-1594
Affected Products:
openSUSE 13.2

An update that fixes 20 vulnerabilities is now available.


seamonkey was updated to version 2.31 to fix 20 security issues.

These security issues were fixed:
- Miscellaneous memory safety hazards (CVE-2014-1587, CVE-2014-1588).
- XBL bindings accessible via improper CSS declarations (CVE-2014-1589).
- XMLHttpRequest crashes with some input streams (CVE-2014-1590).
- CSP leaks redirect data via violation reports (CVE-2014-1591).
- Use-after-free during HTML5 parsing (CVE-2014-1592).
- Buffer overflow while parsing media content (CVE-2014-1593).
- Bad casting from the BasicThebesLayer to BasicContainerLayer
- Miscellaneous memory safety hazards (CVE-2014-1574, CVE-2014-1575).
- Buffer overflow during CSS manipulation (CVE-2014-1576).
- Web Audio memory corruption issues with custom waveforms (CVE-2014-1577).
- Out-of-bounds write with WebM video (CVE-2014-1578).
- Further uninitialized memory use during GIF rendering (CVE-2014-1580).
- Use-after-free interacting with text directionality (CVE-2014-1581).
- Key pinning bypasses (CVE-2014-1582, CVE-2014-1584).
- Inconsistent video sharing within iframe (CVE-2014-1585, CVE-2014-1586).
- Accessing cross-origin objects via the Alarms API (only relevant for
installed web apps) (CVE-2014-1583).

This non-security issue was fixed:
- define /usr/share/myspell as additional dictionary location and remove finally (bnc#900639).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2014-784

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 13.2 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages