Bug 13330 - iceape multiple security updates in Seamonkey 2.26
Summary: iceape multiple security updates in Seamonkey 2.26
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard: MGA3TOO has_procedure advisory mga4-6...
Keywords: Triaged, validated_update
Depends on:
Blocks:
 
Reported: 2014-05-06 20:34 CEST by Bill Wilkinson
Modified: 2014-06-11 19:20 CEST (History)
4 users (show)

See Also:
Source RPM: iceape
CVE:
Status comment:


Attachments

Description Bill Wilkinson 2014-05-06 20:34:19 CEST
Seamonkey 2.26 has been released with multiple security updates.

Reproducible: 

Steps to Reproduce:
Manuel Hiebel 2014-05-08 19:59:17 CEST

Keywords: (none) => Triaged
Component: RPM Packages => Security
Assignee: bugsquad => cjw
Source RPM: (none) => iceape

David Walser 2014-05-12 23:10:33 CEST

Version: 4 => Cauldron
Whiteboard: (none) => MGA4TOO, MGA3TOO
Severity: normal => critical

Christiaan Welvaart 2014-05-13 03:11:51 CEST

Status: NEW => ASSIGNED

Comment 1 andré blais 2014-06-05 08:50:01 CEST
Note that version 2.25 has been modified to include the Lightening agenda extension.
Otherwise it seems that only the branding has changed, since it uses exactly the same profile directories.

Because of recurrent problems with Seamonkey 2.25 (32b on 64b Mageia), I tried Iceape 2.25 (64b), and found that one of my important extensions (clrtabs) no longer works.
It does work with Seamonkey (64b), but that is not localized, and the language packs only partially localize Seamonkey.

So I strongly suspect that this problem is due to the added Lightening extension.

So could whoever updates Iceape please leave out the Lightening extention ?
The user can always download it from Mozilla if they want to, or it could be packaged separately.

That would be very much appreciated.
Thanks :)

CC: (none) => andre999mga

Comment 2 Christiaan Welvaart 2014-06-07 03:04:04 CEST
clrtabs = ColorfulTabs? Could be caused by the branding, I wouldn't expect lightning to do anything. Lightning is still an extension and can be disabled but that doesn't fix ColorfulTabs.
Comment 3 andré blais 2014-06-08 04:02:32 CEST
(Right, clrtabs is the internal name.)

Indeed it could be the branding, but without the Lightning extension, it should be easier to debug.
It could be related to the paths used by clrtabs, but all my other extensions worked normally.
(I just used a copy of my usual profile for testing, and iceape asked to reinstall a few of my 10 or so extensions.)

In any case, there is no harm in not including Lightning.  Those who want it can easily download/install it from mozilla via iceape.
Comment 4 Christiaan Welvaart 2014-06-10 02:21:42 CEST
Updated packages are ready for testing:

MGA3
Source RPM:
iceape-2.26-1.mga3.src.rpm

Binary RPMS:
iceape-2.26-1.mga3.i586.rpm
iceape-2.26-1.mga3.x86_64.rpm


MGA4
Source RPM:
iceape-2.26-1.mga4.src.rpm

Binary RPMS:
iceape-2.26-1.mga4.i586.rpm
iceape-2.26-1.mga4.x86_64.rpm


Proposed advisory:




Updated iceape packages fix security issues:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1518)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1519)

The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content. (CVE-2014-1522)

Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image. (CVE-2014-1523)

The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object. (CVE-2014-1524)

The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document. (CVE-2014-1525)

The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted. (CVE-2014-1529)

The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation. (CVE-2014-1530)

Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation. (CVE-2014-1531)

Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution. (CVE-2014-1532)

The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects. (CVE-2014-1526)




References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
http://www.mozilla.org/security/announce/2014/mfsa2014-34.html
http://www.mozilla.org/security/announce/2014/mfsa2014-36.html
http://www.mozilla.org/security/announce/2014/mfsa2014-37.html
http://www.mozilla.org/security/announce/2014/mfsa2014-38.html
http://www.mozilla.org/security/announce/2014/mfsa2014-39.html
http://www.mozilla.org/security/announce/2014/mfsa2014-42.html
http://www.mozilla.org/security/announce/2014/mfsa2014-43.html
http://www.mozilla.org/security/announce/2014/mfsa2014-44.html
http://www.mozilla.org/security/announce/2014/mfsa2014-46.html
http://www.mozilla.org/security/announce/2014/mfsa2014-47.html

Assignee: cjw => qa-bugs

Comment 5 Bill Wilkinson 2014-06-10 04:04:11 CEST
Tested mga4-64

Browser:
General browsing
Sunspider javascript
Javatester for java plugin
youtube for flash plugin 
Acid3 for general use

Mail:
Send/receive/move/delete over stmp/imap

Chatzilla:
connect to mageia-qa channel on freenode

No regressions noted.

CC: (none) => wrw105
Whiteboard: MGA4TOO, MGA3TOO => MGA4TOO, MGA3TOO mga4-64-ok

Comment 6 Bill Wilkinson 2014-06-10 04:41:46 CEST
tested mga4-32 as in comment 5

No regressions noted, all OK.

Whiteboard: MGA4TOO, MGA3TOO mga4-64-ok => MGA4TOO, MGA3TOO mga4-64-ok mga4-32-ok

Comment 7 Bill Wilkinson 2014-06-10 05:16:53 CEST
Tested mga3-32 as in comment 5

No regressions noted, all OK.

Whiteboard: MGA4TOO, MGA3TOO mga4-64-ok mga4-32-ok => MGA4TOO, MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok

Comment 8 Bill Wilkinson 2014-06-10 05:58:18 CEST
tested mga3-64 as in comment 5

No regressions noted, all OK.

Ready for validation when advisory is uploaded to svn.

Whiteboard: MGA4TOO, MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok => MGA4TOO, MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok

claire robinson 2014-06-10 14:18:43 CEST

Version: Cauldron => 4
Whiteboard: MGA4TOO, MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok => MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok

Comment 9 claire robinson 2014-06-10 14:55:04 CEST
Well done Bill.

Validating. Advisory uploaded.

Could sysadmin please push to 3 & 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok => MGA3TOO has_procedure advisory mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok
CC: (none) => sysadmin-bugs

Comment 10 Thomas Backlund 2014-06-11 19:17:01 CEST
Advisory had _way_ too long lines.

Update pushed:
http://advisories.mageia.org/MGASA-2014-0259.html

Status: ASSIGNED => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED

Comment 11 claire robinson 2014-06-11 19:20:47 CEST
oops sorry

Note You need to log in before you can comment on or make changes to this bug.