Bug 14076 - Iceape:Multiple security updates in Seamonkey 2.29 and 2.29.1
Summary: Iceape:Multiple security updates in Seamonkey 2.29 and 2.29.1
Status: RESOLVED OLD
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA3TOO mga4-32-ok mga3-32-ok mga3-64...
Keywords: Triaged, validated_update
Depends on:
Blocks:
 
Reported: 2014-09-09 16:17 CEST by Bill Wilkinson
Modified: 2014-10-20 22:17 CEST (History)
4 users (show)

See Also:
Source RPM: iceape
CVE:
Status comment:


Attachments

Description Bill Wilkinson 2014-09-09 16:17:41 CEST
The Seamonkey project has released seamonkey 2.29 with multiple security updates.

Reproducible: 

Steps to Reproduce:
Manuel Hiebel 2014-09-09 19:13:13 CEST

Keywords: (none) => Triaged
Component: RPM Packages => Security
Assignee: bugsquad => cjw
Source RPM: (none) => iceape

Manuel Hiebel 2014-09-09 19:14:48 CEST

QA Contact: (none) => security

Comment 1 Bill Wilkinson 2014-09-25 16:53:25 CEST
I see this has been uploaded to cauldron--any update on mga3/4 builds?

CC: (none) => wrw105

Comment 2 andré blais 2014-10-05 10:14:46 CEST
BTW, seamonkey 2.29.1 has been released with (only) a critical security update.
So the update should be directly 2.26 -> 2.29.1

CC: (none) => andre999mga

andré blais 2014-10-05 10:16:31 CEST

Summary: Iceape:Multiple security updates in Seamonkey 2.29 => Iceape:Multiple security updates in Seamonkey 2.29 and 2.29.1

Comment 3 Christiaan Welvaart 2014-10-12 22:40:05 CEST
(2.29.1 is only an update of NSS which was already fixed in mga4/mga3)


Updated packages are ready for testing:

MGA3
Source RPM:
iceape-2.29-1.mga3.src.rpm

Binary RPMS:
iceape-2.29-1.mga3.i586.rpm
iceape-2.29-1.mga3.x86_64.rpm


MGA4
Source RPM:
iceape-2.29-1.mga4.src.rpm

Binary RPMS:
iceape-2.29-1.mga4.i586.rpm
iceape-2.29-1.mga4.x86_64.rpm



Proposed advisory:



Updated iceape packages fix security issues:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1533)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1534)

The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors. (CVE-2014-1536)

Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. (CVE-2014-1537)

Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. (CVE-2014-1538)

Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content. (CVE-2014-1540)

Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content. (CVE-2014-1541)

Buffer overflow in the Speex resampler in the Web Audio subsystem in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code via vectors related to a crafted AudioBuffer channel count and sample rate. (CVE-2014-1542)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1547)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1548)

The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering. (CVE-2014-1549)

Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering. (CVE-2014-1550)

Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization. (CVE-2014-1561)

Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event. (CVE-2014-1555)

Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library. (CVE-2014-1556)

The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image. (CVE-2014-1557)

Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559. (CVE-2014-1558)

Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558. (CVE-2014-1559)

Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context. (CVE-2014-1560)

Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect. (CVE-2014-1552)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1553)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1554)

Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1562)

Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection. (CVE-2014-1563)

Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image. (CVE-2014-1564)

Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout. (CVE-2014-1567)




References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
https://www.mozilla.org/security/announce/2014/mfsa2014-48.html
https://www.mozilla.org/security/announce/2014/mfsa2014-49.html
https://www.mozilla.org/security/announce/2014/mfsa2014-51.html
https://www.mozilla.org/security/announce/2014/mfsa2014-52.html
https://www.mozilla.org/security/announce/2014/mfsa2014-53.html
https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
https://www.mozilla.org/security/announce/2014/mfsa2014-67.html
https://www.mozilla.org/security/announce/2014/mfsa2014-68.html
https://www.mozilla.org/security/announce/2014/mfsa2014-69.html
https://www.mozilla.org/security/announce/2014/mfsa2014-70.html
https://www.mozilla.org/security/announce/2014/mfsa2014-72.html

Assignee: cjw => qa-bugs
Whiteboard: (none) => MGA3TOO

Comment 4 Bill Wilkinson 2014-10-13 01:25:18 CEST
Tested general use, mga4-32.

General browsing, java plugin through javatester.org, javascript through sunspider, acid3, all OK

Mail: send/receive/move/delete over SMTP/IMAP. All OK.

Chatzilla: joined freenode on the #mageia-qa channel.  Quiet, but worked.

Whiteboard: MGA3TOO => MGA3TOO mga4-32-ok

Comment 5 Bill Wilkinson 2014-10-13 02:16:46 CEST
Mga3-32 tested as above, all OK.

Whiteboard: MGA3TOO mga4-32-ok => MGA3TOO mga4-32-ok mga3-32-ok

Comment 6 Bill Wilkinson 2014-10-13 03:13:07 CEST
Mga3-64 tested as above, all OK.

Whiteboard: MGA3TOO mga4-32-ok mga3-32-ok => MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok

Comment 7 Bill Wilkinson 2014-10-13 03:54:54 CEST
mga4-64 tested as above, all OK.

Ready for validation when advisory is uploaded to SVN.

Whiteboard: MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok => MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok mga4-64-ok

Comment 8 Rémi Verschelde 2014-10-18 10:34:22 CEST
Advisory uploaded. Nice list of CVEs :-O
Validating.

Please push iceape to mga 3&4 core/updates.

Keywords: (none) => validated_update
Whiteboard: MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok mga4-64-ok => MGA3TOO mga4-32-ok mga3-32-ok mga3-64-ok mga4-64-ok advisory
CC: (none) => sysadmin-bugs

Comment 9 Christiaan Welvaart 2014-10-20 22:17:48 CEST
I pushed iceape 2.30 to cauldron and submitted mga4&mga3 packages. Closing this bug because having two updates so close to each other doesn't make much sense. I also need to know what to include in the 2.30 advisory - it will now be the long list above with a few new ones.

Status: NEW => RESOLVED
CC: (none) => cjw
Resolution: (none) => OLD


Note You need to log in before you can comment on or make changes to this bug.