SUSE 5145 Published by

The following two updates are available for openSUSE: openSUSE-SU-2011:0958-1: important: MozillaFirefox: Update to Firefox 3.6.20 and openSUSE-SU-2011:0957-1: important: seamonkey: Update to Mozilla Seamonkey 2.3



openSUSE-SU-2011:0958-1: important: MozillaFirefox: Update to Firefox 3.6.20
openSUSE Security Update: MozillaFirefox: Update to Firefox 3.6.20
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0958-1
Rating: important
References: #712224
Cross-References: CVE-2011-0084 CVE-2011-2378 CVE-2011-2980
CVE-2011-2981 CVE-2011-2982 CVE-2011-2983
CVE-2011-2984
Affected Products:
openSUSE 11.3
______________________________________________________________________________

An update that fixes 7 vulnerabilities is now available. It
includes two new package versions.

Description:

Mozilla Firefox was updated to version 3.6.20.

It fixes bugs and security issues. Following security
issues were fixed:
http://www.mozilla.org/security/announce/2011/mfsa2011-30.ht
ml Mozilla Foundation Security Advisory 2011-30 (MFSA
2011-30)

* Miscellaneous memory safety hazards

Mozilla developers and community members identified and
fixed several memory safety bugs in the browser engine used
in Firefox 3.6 and other Mozilla-based products. Some of
these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.

Gary Kwong, Igor Bukanov, Nils and Bob Clary reported
memory safety issues which affected Firefox 3.6.
(CVE-2011-2982)

* Crash in SVGTextElement.getCharNumAtPosition()

Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that a SVG text
manipulation routine contained a dangling pointer
vulnerability. (CVE-2011-0084)

* Privilege escalation using event handlers

Mozilla security researcher moz_bug_r_a_4 reported a
vulnerability in event management code that would permit
JavaScript to be run in the wrong context, including that
of a different website or potentially in a
chrome-privileged context. (CVE-2011-2981)

* Dangling pointer vulnerability in appendChild

Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that appendChild did
not correctly account for DOM objects it operated upon and
could be exploited to dereference an invalid pointer.
(CVE-2011-2378)

* Privilege escalation dropping a tab element in content
area

Mozilla security researcher moz_bug_r_a4 reported that
web content could receive chrome privileges if it
registered for drop events and a browser tab element was
dropped into the content area. (CVE-2011-2984)

* Binary planting vulnerability in ThinkPadSensor::Startup

Security researcher Mitja Kolsek of Acros Security
reported that ThinkPadSensor::Startup could potentially be
exploited to load a malicious DLL into the running process.
(CVE-2011-2980) (This issue is likely Windows only)

* Private data leakage using RegExp.input

Security researcher shutdown reported that data from
other domains could be read when RegExp.input was set.
(CVE-2011-2983)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch MozillaFirefox-5013

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.3 (i586 x86_64) [New Version: 1.9.2.20 and 3.6.20]:

MozillaFirefox-3.6.20-0.2.1
MozillaFirefox-branding-upstream-3.6.20-0.2.1
MozillaFirefox-translations-common-3.6.20-0.2.1
MozillaFirefox-translations-other-3.6.20-0.2.1
mozilla-js192-1.9.2.20-1.2.1
mozilla-xulrunner192-1.9.2.20-1.2.1
mozilla-xulrunner192-buildsymbols-1.9.2.20-1.2.1
mozilla-xulrunner192-devel-1.9.2.20-1.2.1
mozilla-xulrunner192-gnome-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-common-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-other-1.9.2.20-1.2.1

- openSUSE 11.3 (x86_64) [New Version: 1.9.2.20]:

mozilla-js192-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-gnome-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-common-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-other-32bit-1.9.2.20-1.2.1


References:

http://support.novell.com/security/cve/CVE-2011-0084.html
http://support.novell.com/security/cve/CVE-2011-2378.html
http://support.novell.com/security/cve/CVE-2011-2980.html
http://support.novell.com/security/cve/CVE-2011-2981.html
http://support.novell.com/security/cve/CVE-2011-2982.html
http://support.novell.com/security/cve/CVE-2011-2983.html
http://support.novell.com/security/cve/CVE-2011-2984.html
https://bugzilla.novell.com/712224
openSUSE-SU-2011:0957-1: important: seamonkey: Update to Mozilla Seamonkey 2.3
openSUSE Security Update: seamonkey: Update to Mozilla Seamonkey 2.3
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0957-1
Rating: important
References: #712224
Cross-References: CVE-2011-0084 CVE-2011-2985 CVE-2011-2986
CVE-2011-2987 CVE-2011-2988 CVE-2011-2989
CVE-2011-2990 CVE-2011-2991 CVE-2011-2992
CVE-2011-2993
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________

An update that fixes 10 vulnerabilities is now available.
It includes one version update.

Description:

Mozilla Seamonkey suite was updated to version 2.3.

The update fixes bugs and security issues. Following
security issues were fixed:
http://www.mozilla.org/security/announce/2011/mfsa2011-33.ht
ml Mozilla Foundation Security Advisory 2011-33 (MFSA
2011-33) Mozilla Foundation Security Advisory 2011-33

* Miscellaneous memory safety hazards (rv:4.0) Mozilla
identified and fixed several memory safety bugs in the
browser engine used in SeaMonkey 2.2 and other
Mozilla-based products. Some of these bugs showed
evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code.

Aral Yaman reported a WebGL crash which affected
SeaMonkey 2.2. (CVE-2011-2989)

Vivekanand Bolajwar reported a JavaScript crash which
affected SeaMonkey 2.2. (CVE-2011-2991)

Bert Hubert and Theo Snelleman of Fox-IT reported a crash
in the Ogg reader which affected SeaMonkey 2.2.
(CVE-2011-2992)

Mozilla developers and community members Robert Kaiser,
Jesse Ruderman, moz_bug_r_a4, Mardeg, Gary Kwong, Christoph
Diehl, Martijn Wargers, Travis Emmitt, Bob Clary and
Jonathan Watt reported memory safety issues which affected
SeaMonkey 2.2. (CVE-2011-2985)

* Unsigned scripts can call script inside signed JAR

Rafael Gieschke reported that unsigned JavaScript could
call into script inside a signed JAR thereby inheriting the
identity of the site that signed the JAR as well as any
permissions that a user had granted the signed JAR.
(CVE-2011-2993)

* String crash using WebGL shaders

Michael Jordon of Context IS reported that an overly long
shader program could cause a buffer overrun and crash in a
string class used to store the shader source code.
(CVE-2011-2988)

* Heap overflow in ANGLE library

Michael Jordon of Context IS reported a potentially
exploitable heap overflow in the ANGLE library used by
Mozilla's WebGL implementation. (CVE-2011-2987)

* Crash in SVGTextElement.getCharNumAtPosition()

Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that a SVG text
manipulation routine contained a dangling pointer
vulnerability. (CVE-2011-0084)

* Credential leakage using Content Security Policy reports

Mike Cardwell reported that Content Security Policy
violation reports failed to strip out proxy authorization
credentials from the list of request headers. Daniel Veditz
reported that redirecting to a website with Content
Security Policy resulted in the incorrect resolution of
hosts in the constructed policy. (CVE-2011-2990)

* Cross-origin data theft using canvas and Windows D2D

nasalislarvatus3000 reported that when using Windows D2D
hardware acceleration, image data from one domain could be
inserted into a canvas and read by a different domain.
(CVE-2011-2986)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch seamonkey-5024

- openSUSE 11.3:

zypper in -t patch seamonkey-5024

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64) [New Version: 2.3]:

seamonkey-2.3-2.2.1
seamonkey-dom-inspector-2.3-2.2.1
seamonkey-irc-2.3-2.2.1
seamonkey-translations-common-2.3-2.2.1
seamonkey-translations-other-2.3-2.2.1
seamonkey-venkman-2.3-2.2.1

- openSUSE 11.3 (i586 x86_64) [New Version: 2.3]:

seamonkey-2.3-2.2.1
seamonkey-dom-inspector-2.3-2.2.1
seamonkey-irc-2.3-2.2.1
seamonkey-translations-common-2.3-2.2.1
seamonkey-translations-other-2.3-2.2.1
seamonkey-venkman-2.3-2.2.1


References:

http://support.novell.com/security/cve/CVE-2011-0084.html
http://support.novell.com/security/cve/CVE-2011-2985.html
http://support.novell.com/security/cve/CVE-2011-2986.html
http://support.novell.com/security/cve/CVE-2011-2987.html
http://support.novell.com/security/cve/CVE-2011-2988.html
http://support.novell.com/security/cve/CVE-2011-2989.html
http://support.novell.com/security/cve/CVE-2011-2990.html
http://support.novell.com/security/cve/CVE-2011-2991.html
http://support.novell.com/security/cve/CVE-2011-2992.html
http://support.novell.com/security/cve/CVE-2011-2993.html
https://bugzilla.novell.com/712224