| Summary: | Iceape:Multiple security updates in Seamonkey 2.29 and 2.29.1 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Bill Wilkinson <wrw105> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED OLD | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andr999, cjw, sysadmin-bugs, wrw105 |
| Version: | 4 | Keywords: | Triaged, validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok mga4-64-ok advisory | ||
| Source RPM: | iceape | CVE: | |
| Status comment: | |||
|
Description
Bill Wilkinson
2014-09-09 16:17:41 CEST
Manuel Hiebel
2014-09-09 19:13:13 CEST
Keywords:
(none) =>
Triaged
Manuel Hiebel
2014-09-09 19:14:48 CEST
QA Contact:
(none) =>
security I see this has been uploaded to cauldron--any update on mga3/4 builds? CC:
(none) =>
wrw105 BTW, seamonkey 2.29.1 has been released with (only) a critical security update. So the update should be directly 2.26 -> 2.29.1 CC:
(none) =>
andre999mga
andré blais
2014-10-05 10:16:31 CEST
Summary:
Iceape:Multiple security updates in Seamonkey 2.29 =>
Iceape:Multiple security updates in Seamonkey 2.29 and 2.29.1 (2.29.1 is only an update of NSS which was already fixed in mga4/mga3) Updated packages are ready for testing: MGA3 Source RPM: iceape-2.29-1.mga3.src.rpm Binary RPMS: iceape-2.29-1.mga3.i586.rpm iceape-2.29-1.mga3.x86_64.rpm MGA4 Source RPM: iceape-2.29-1.mga4.src.rpm Binary RPMS: iceape-2.29-1.mga4.i586.rpm iceape-2.29-1.mga4.x86_64.rpm Proposed advisory: Updated iceape packages fix security issues: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1533) Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1534) The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors. (CVE-2014-1536) Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. (CVE-2014-1537) Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. (CVE-2014-1538) Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content. (CVE-2014-1540) Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content. (CVE-2014-1541) Buffer overflow in the Speex resampler in the Web Audio subsystem in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code via vectors related to a crafted AudioBuffer channel count and sample rate. (CVE-2014-1542) Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1547) Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1548) The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering. (CVE-2014-1549) Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering. (CVE-2014-1550) Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization. (CVE-2014-1561) Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event. (CVE-2014-1555) Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library. (CVE-2014-1556) The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image. (CVE-2014-1557) Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559. (CVE-2014-1558) Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558. (CVE-2014-1559) Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context. (CVE-2014-1560) Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect. (CVE-2014-1552) Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1553) Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1554) Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1562) Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection. (CVE-2014-1563) Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image. (CVE-2014-1564) Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout. (CVE-2014-1567) References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567 https://www.mozilla.org/security/announce/2014/mfsa2014-48.html https://www.mozilla.org/security/announce/2014/mfsa2014-49.html https://www.mozilla.org/security/announce/2014/mfsa2014-51.html https://www.mozilla.org/security/announce/2014/mfsa2014-52.html https://www.mozilla.org/security/announce/2014/mfsa2014-53.html https://www.mozilla.org/security/announce/2014/mfsa2014-56.html https://www.mozilla.org/security/announce/2014/mfsa2014-57.html https://www.mozilla.org/security/announce/2014/mfsa2014-58.html https://www.mozilla.org/security/announce/2014/mfsa2014-60.html https://www.mozilla.org/security/announce/2014/mfsa2014-61.html https://www.mozilla.org/security/announce/2014/mfsa2014-62.html https://www.mozilla.org/security/announce/2014/mfsa2014-64.html https://www.mozilla.org/security/announce/2014/mfsa2014-65.html https://www.mozilla.org/security/announce/2014/mfsa2014-66.html https://www.mozilla.org/security/announce/2014/mfsa2014-67.html https://www.mozilla.org/security/announce/2014/mfsa2014-68.html https://www.mozilla.org/security/announce/2014/mfsa2014-69.html https://www.mozilla.org/security/announce/2014/mfsa2014-70.html https://www.mozilla.org/security/announce/2014/mfsa2014-72.html Assignee:
cjw =>
qa-bugs Tested general use, mga4-32. General browsing, java plugin through javatester.org, javascript through sunspider, acid3, all OK Mail: send/receive/move/delete over SMTP/IMAP. All OK. Chatzilla: joined freenode on the #mageia-qa channel. Quiet, but worked. Whiteboard:
MGA3TOO =>
MGA3TOO mga4-32-ok Mga3-32 tested as above, all OK. Whiteboard:
MGA3TOO mga4-32-ok =>
MGA3TOO mga4-32-ok mga3-32-ok Mga3-64 tested as above, all OK. Whiteboard:
MGA3TOO mga4-32-ok mga3-32-ok =>
MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok mga4-64 tested as above, all OK. Ready for validation when advisory is uploaded to SVN. Whiteboard:
MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok =>
MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok mga4-64-ok Advisory uploaded. Nice list of CVEs :-O Validating. Please push iceape to mga 3&4 core/updates. Keywords:
(none) =>
validated_update I pushed iceape 2.30 to cauldron and submitted mga4&mga3 packages. Closing this bug because having two updates so close to each other doesn't make much sense. I also need to know what to include in the 2.30 advisory - it will now be the long list above with a few new ones. Status:
NEW =>
RESOLVED |