Updated firefox and thunderbird packages fix security vulnerabilities
Publication date: 25 Oct 2014Modification date: 25 Oct 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-1574 , CVE-2014-1576 , CVE-2014-1577 , CVE-2014-1578 , CVE-2014-1581 , CVE-2014-1583 , CVE-2014-5369
Description
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox or Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running it (CVE-2014-1574, CVE-2014-1578, CVE-2014-1581, CVE-2014-1576, CVE-2014-1577). A flaw was found in the Alarm API in Firefox, which allows applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass cross-origin restrictions (CVE-2014-1583). This update provides Firefox and Thunderbird 31.2, which fixes these issues and other bugs, and also provides several new features, including WebRTC support. The thunderbird-lightning package has also been updated to version 3.3 which is compatible with the new Thunderbird version. Also, Enigmail (part of the Thunderbird package) has been updated to version 1.7.2 which contains several bugfixes including mail with only Bcc recipients being sent in plain text unexpectedly (CVE-2014-5369).
References
- https://bugs.mageia.org/show_bug.cgi?id=14293
- https://www.mozilla.org/security/announce/2014/mfsa2014-74.html
- https://www.mozilla.org/security/announce/2014/mfsa2014-75.html
- https://www.mozilla.org/security/announce/2014/mfsa2014-76.html
- https://www.mozilla.org/security/announce/2014/mfsa2014-77.html
- https://www.mozilla.org/security/announce/2014/mfsa2014-79.html
- https://www.mozilla.org/security/announce/2014/mfsa2014-82.html
- https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
- https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
- https://rhn.redhat.com/errata/RHSA-2014-1635.html
- https://rhn.redhat.com/errata/RHSA-2014-1647.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369
SRPMS
3/core
- libvpx-1.3.0-1.mga3
- sqlite3-3.8.6-1.mga3
- nss-3.17.2-1.mga3
- firefox-31.2.0-1.mga3
- firefox-l10n-31.2.0-1.mga3
- thunderbird-31.2.0-1.mga3
- thunderbird-l10n-31.2.0-1.mga3
- thunderbird-lightning-3.3-1.mga3
4/core
- libpng-1.6.13-1.mga4
- libvpx-1.3.0-1.mga4
- sqlite3-3.8.6-1.mga4
- nss-3.17.2-1.mga4
- firefox-31.2.0-1.mga4
- firefox-l10n-31.2.0-1.mga4
- thunderbird-31.2.0-1.mga4
- thunderbird-l10n-31.2.0-1.mga4
- thunderbird-lightning-3.3-1.mga4