openSUSE Security Update : seamonkey (openSUSE-SU-2014:1655-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

seamonkey was updated to version 2.31 to fix 20 security issues.

These security issues were fixed :

- Miscellaneous memory safety hazards (CVE-2014-1587,

- XBL bindings accessible via improper CSS declarations

- XMLHttpRequest crashes with some input streams

- CSP leaks redirect data via violation reports

- Use-after-free during HTML5 parsing (CVE-2014-1592).

- Buffer overflow while parsing media content

- Bad casting from the BasicThebesLayer to
BasicContainerLayer (CVE-2014-1594).

- Miscellaneous memory safety hazards (CVE-2014-1574,

- Buffer overflow during CSS manipulation (CVE-2014-1576).

- Web Audio memory corruption issues with custom waveforms

- Out-of-bounds write with WebM video (CVE-2014-1578).

- Further uninitialized memory use during GIF rendering

- Use-after-free interacting with text directionality

- Key pinning bypasses (CVE-2014-1582, CVE-2014-1584).

- Inconsistent video sharing within iframe (CVE-2014-1585,

- Accessing cross-origin objects via the Alarms API (only
relevant for installed web apps) (CVE-2014-1583).

This non-security issue was fixed :

- define /usr/share/myspell as additional dictionary
location and remove finally (bnc#900639).

See also :

Solution :

Update the affected seamonkey packages.

Risk factor :

High / CVSS Base Score : 7.5

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now