LWN.net Logo

Mageia alert MGASA-2013-0008 (iceape)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0008: iceape-2.15-1.mga2, opus-1.0.2-1.mga2 (2/core)
Date:  Mon, 14 Jan 2013 22:40:01 +0100
Message-ID:  <20130114214001.GA25276@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0008 Date: January 14th, 2013 Affected releases: 2 Description: Updated iceape packages fix security issues: Nemory safety problems and crashes that affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (CVE-2013-0769, MFSA 2013-01) Nemory safety problems and crashes that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749, MFSA 2013-01) Nmemory safety problems and crashes that affect Firefox 17. (CVE-2013-0770, MFSA 2013-01) Global-buffer-overflow in CharDistributionAnalysis::HandleOneChar. (CVE-2013-0760, MFSA 2013-02) Heap-use-after-free in imgRequest::OnStopFrame. (CVE-2013-0762, MFSA 2013-02) Heap-use-after-free in ~nsHTMLEditRules. (CVE-2013-0766, MFSA 2013-02) Out of bounds read in nsSVGPathElement::GetPathLengthScale. (CVE-2013-0767, MFSA 2013-02) Heap-use-after-free in mozilla::TrackUnionStream::EndTrack. (CVE-2013-0761, MFSA 2013-02) Heap-use-after-free in Mesa, triggerable by resizing a WebGL canvas. (CVE-2013-0763, MFSA 2013-02) Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries. (CVE-2013-0771, MFSA 2013-02) Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2012-5829) Stack buffer overflow with canvas. (CVE-2013-0768, MFSA 2013-03) URL spoofing with credentials info of URL & 204. (CVE-2013-0759, MFSA 2013-04) Heap-use-after-free in TableBackgroundPainter::TableBackgroundData::Destroy. (CVE-2013-0744, MFSA 2013-05) Touch events are shared across iframes (CVE-2013-0751, MFSA 2013-06) Crash [@ nsSOCKSSocketInfo::ConnectToProxy(PRFileDesc*) ] clicking "Download the rest of the message" (CVE-2013-0764, MFSA 2013-07) The AutoWrapperChanger class fails to keep some javascript objects alive during garbage collection. This can lead to an exploitable crash allowing for arbitrary code execution. (CVE-2013-0745, MFSA 2013-08) In com cases, jsval-returning quickstubs fail to wrap their return values, causing a compartment mismatch. This mismatch can cause garbage collection to occur incorrectly and lead to a potentially exploitable crash. (CVE-2013-0746, MFSA 2013-09) Events in the plugin handler can be manipulated by web content to bypass same-origin policy (SOP) restrictions. This can allow for clickjacking on malicious web pages. (CVE-2013-0747, MFSA 2013-10) Using the toString function of XBL objects can lead to inappropriate information leakage by revealing the address space layout instead of just the ID of the object. This layout information could potentially be used to bypass ASLR and other security protections. (CVE-2013-0748, MFSA 2013-11) An integer overflow is possible when calculating the length for a Javascript string concatenation, which is then used for memory allocation. This results in a buffer overflow, leading to a potentially exploitable memory corruption. (CVE-2013-0750, MFSA 2013-12) When using an XBL file containing multiple XML bindings with SVG content, a memory corruption can occur. In concern with remote XUL, this can lead to an exploitable crash. (CVE-2013-0752, MFSA 2013-13) It is possible to change the prototype of an object and bypass Chrome Object Wrappers (COW) to gain access to chrome privileged functions. This could allow for arbitrary code execution. (CVE-2013-0757, MFSA 2013-14) It is possible to open a chrome privileged web page through plugin objects through interaction with SVG elements. This could allow for arbitrary code execution. (CVE-2013-0758, MFSA 2013-15) By the exposing of serializeToStream to web content, a use-after-free may occur in XMLSerializer. This can lead to arbitrary code execution when exploited. (CVE-2013-0753, MFSA 2013-16) A use-after-free was reported within the ListenerManager when garbage collection is forced after data in listener objects have been allocated in some circumstances. This can lead to arbitrary code execution. (CVE-2013-0754, MFSA 2013-17) Using the domDoc pointer within Vibrate library, memory may be used after being freed. This can lead to arbitrary code execution when exploited. (CVE-2013-0755, MFSA 2013-18) A garbage collection flaw in Javascript Proxy objects can lead to a use-after-free leading to arbitrary code execution. (CVE-2013-0756, MFSA 2013-19) TURKTRUST, a certificate authority in Mozilla\u2019s root program, has mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking the trust for these specific mis-issued certificates. (CVE-2013-0743, MFSA 2013-20) This update also fixes HTML5 opus audio playback. Updated Packages: iceape-2.15-1.mga2 lib(64)opus0-1.0.2-1.mga2 lib(64)opus-devel-1.0.2-1.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771 http://www.mozilla.org/security/announce/2013/mfsa2013-01... http://www.mozilla.org/security/announce/2013/mfsa2013-02... http://www.mozilla.org/security/announce/2013/mfsa2013-03... http://www.mozilla.org/security/announce/2013/mfsa2013-04... http://www.mozilla.org/security/announce/2013/mfsa2013-05... http://www.mozilla.org/security/announce/2013/mfsa2013-06... http://www.mozilla.org/security/announce/2013/mfsa2013-07... http://www.mozilla.org/security/announce/2013/mfsa2013-08... http://www.mozilla.org/security/announce/2013/mfsa2013-09... http://www.mozilla.org/security/announce/2013/mfsa2013-10... http://www.mozilla.org/security/announce/2013/mfsa2013-11... http://www.mozilla.org/security/announce/2013/mfsa2013-12... http://www.mozilla.org/security/announce/2013/mfsa2013-13... http://www.mozilla.org/security/announce/2013/mfsa2013-14... http://www.mozilla.org/security/announce/2013/mfsa2013-15... http://www.mozilla.org/security/announce/2013/mfsa2013-16... http://www.mozilla.org/security/announce/2013/mfsa2013-17... http://www.mozilla.org/security/announce/2013/mfsa2013-18... http://www.mozilla.org/security/announce/2013/mfsa2013-19... http://www.mozilla.org/security/announce/2013/mfsa2013-20... https://bugs.mageia.org/show_bug.cgi?id=8673 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds