Articles / SuSE: New Seamonkey package…

SuSE: New Seamonkey packages fix security vulnerability

Mozilla Seamonkey suite was updated to version 2.3. Miscellaneous memory safety hazards Mozilla identified and fixed several memory safety bugs in the browser engine used in SeaMonkey 2.2 and other Mozilla-based products. Aral Yaman reported a WebGL crash. Vivekanand Bolajwar reported a JavaScript crash. Bert Hubert and Theo Snelleman of Fox-IT reported a crash in the Ogg reader.

Mozilla developers and community members reported memory safety issues. Rafael Gieschke reported that unsigned JavaScript could call into script inside a signed JAR thereby inheriting the identity of the site that signed the JAR as well as any permissions that a user had granted the signed JAR. Michael Jordon of Context IS reported that an overly long shader program could cause a buffer overrun and crash in a string class used to store the shader source code.

Michael Jordon of Context IS reported a potentially exploitable heap overflow in the ANGLE library used by Mozilla’s WebGL implementation. Security researcher regenrecht reported via TippingPoint’s Zero Day Initiative that a SVG text manipulation routine contained a dangling pointer vulnerability. Mike Cardwell reported that Content Security Policy violation reports failed to strip out proxy authorization credentials from the list of request headers. Daniel Veditz reported that redirecting to a website with Content Security Policy resulted in the incorrect resolution of hosts in the constructed policy.

nasalislarvatus3000 reported that when using Windows D2D hardware acceleration, image data from one domain could be inserted into a canvas and read by a different domain. Updated packages are available from download.opensuse.org.

  openSUSE Security Update: seamonkey: Update to Mozilla Seamonkey 2.3
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2011:0957-1
Rating:             important
References:         #712224 
Cross-References:   CVE-2011-0084 CVE-2011-2985 CVE-2011-2986
                   CVE-2011-2987 CVE-2011-2988 CVE-2011-2989
                   CVE-2011-2990 CVE-2011-2991 CVE-2011-2992
                   CVE-2011-2993
Affected Products:
                   openSUSE 11.4
                   openSUSE 11.3
______________________________________________________________________________

  An update that fixes 10 vulnerabilities is now available.
  It includes one version update.

Description:

  Mozilla Seamonkey suite was updated to version 2.3.

  The update fixes bugs and security issues. Following
  security issues were fixed:
  http://www.mozilla.org/security/announce/2011/mfsa2011-33.ht
  ml Mozilla Foundation Security Advisory 2011-33 (MFSA
  2011-33) Mozilla Foundation Security Advisory 2011-33

  * Miscellaneous memory safety hazards (rv:4.0) Mozilla
  identified and fixed several memory safety bugs in the
  browser engine used in SeaMonkey 2.2 and other
  Mozilla-based products. Some of these bugs showed
  evidence of memory corruption under certain
  circumstances, and we presume that with enough effort at
  least some of these could be exploited to run arbitrary
  code.

  Aral Yaman reported a WebGL crash which affected
  SeaMonkey 2.2. (CVE-2011-2989)

  Vivekanand Bolajwar reported a JavaScript crash which
  affected SeaMonkey 2.2. (CVE-2011-2991)

  Bert Hubert and Theo Snelleman of Fox-IT reported a crash
  in the Ogg reader which affected SeaMonkey 2.2.
  (CVE-2011-2992)

  Mozilla developers and community members Robert Kaiser,
  Jesse Ruderman, moz_bug_r_a4, Mardeg, Gary Kwong, Christoph
  Diehl, Martijn Wargers, Travis Emmitt, Bob Clary and
  Jonathan Watt reported memory safety issues which affected
  SeaMonkey 2.2. (CVE-2011-2985)

  * Unsigned scripts can call script inside signed JAR

  Rafael Gieschke reported that unsigned JavaScript could
  call into script inside a signed JAR thereby inheriting the
  identity of the site that signed the JAR as well as any
  permissions that a user had granted the signed JAR.
  (CVE-2011-2993)

  * String crash using WebGL shaders

  Michael Jordon of Context IS reported that an overly long
  shader program could cause a buffer overrun and crash in a
  string class used to store the shader source code.
  (CVE-2011-2988)

  * Heap overflow in ANGLE library

  Michael Jordon of Context IS reported a potentially
  exploitable heap overflow in the ANGLE library used by
  Mozilla's WebGL implementation. (CVE-2011-2987)

  * Crash in SVGTextElement.getCharNumAtPosition()

  Security researcher regenrecht reported via
  TippingPoint's Zero Day Initiative that a SVG text
  manipulation routine contained a dangling pointer
  vulnerability. (CVE-2011-0084)

  * Credential leakage using Content Security Policy reports

  Mike Cardwell reported that Content Security Policy
  violation reports failed to strip out proxy authorization
  credentials from the list of request headers. Daniel Veditz
  reported that redirecting to a website with Content
  Security Policy resulted in the incorrect resolution of
  hosts in the constructed policy. (CVE-2011-2990)

  * Cross-origin data theft using canvas and Windows D2D

  nasalislarvatus3000 reported that when using Windows D2D
  hardware acceleration, image data from one domain could be
  inserted into a canvas and read by a different domain.
  (CVE-2011-2986)


Patch Instructions:

  To install this openSUSE Security Update use YaST online_update.
  Alternatively you can run the command listed for your product:

  - openSUSE 11.4:

     zypper in -t patch seamonkey-5024

  - openSUSE 11.3:

     zypper in -t patch seamonkey-5024

  To bring your system up-to-date, use "zypper patch".


Package List:

  - openSUSE 11.4 (i586 x86_64) [New Version: 2.3]:

     seamonkey-2.3-2.2.1
     seamonkey-dom-inspector-2.3-2.2.1
     seamonkey-irc-2.3-2.2.1
     seamonkey-translations-common-2.3-2.2.1
     seamonkey-translations-other-2.3-2.2.1
     seamonkey-venkman-2.3-2.2.1

  - openSUSE 11.3 (i586 x86_64) [New Version: 2.3]:

     seamonkey-2.3-2.2.1
     seamonkey-dom-inspector-2.3-2.2.1
     seamonkey-irc-2.3-2.2.1
     seamonkey-translations-common-2.3-2.2.1
     seamonkey-translations-other-2.3-2.2.1
     seamonkey-venkman-2.3-2.2.1


References:

  http://support.novell.com/security/cve/CVE-2011-0084.html
  http://support.novell.com/security/cve/CVE-2011-2985.html
  http://support.novell.com/security/cve/CVE-2011-2986.html
  http://support.novell.com/security/cve/CVE-2011-2987.html
  http://support.novell.com/security/cve/CVE-2011-2988.html
  http://support.novell.com/security/cve/CVE-2011-2989.html
  http://support.novell.com/security/cve/CVE-2011-2990.html
  http://support.novell.com/security/cve/CVE-2011-2991.html
  http://support.novell.com/security/cve/CVE-2011-2992.html
  http://support.novell.com/security/cve/CVE-2011-2993.html
  https://bugzilla.novell.com/712224
Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.