Updated iceape packages fix security vulnerabilities
Publication date: 16 Nov 2015Modification date: 16 Nov 2015
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-4513 , CVE-2015-4514 , CVE-2015-4515 , CVE-2015-4518 , CVE-2015-7187 , CVE-2015-7188 , CVE-2015-7189 , CVE-2015-7193 , CVE-2015-7194 , CVE-2015-7195 , CVE-2015-7196 , CVE-2015-7197 , CVE-2015-7198 , CVE-2015-7199 , CVE-2015-7200
Description
Updated iceape packages fix security issues:
Multiple unspecified vulnerabilities in the browser engine in Mozilla
Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers
to cause a denial of service (memory corruption and application crash) or
possibly execute arbitrary code via unknown vectors. (CVE-2015-4513)
Multiple unspecified vulnerabilities in the browser engine in Mozilla
Firefox before 42.0 allow remote attackers to cause a denial of service
(memory corruption and application crash) or possibly execute arbitrary
code via unknown vectors. (CVE-2015-4514)
Mozilla Firefox before 42.0, when NTLM v1 is enabled for HTTP
authentication, allows remote attackers to obtain sensitive hostname
information by constructing a crafted web site that sends an NTLM request
and reads the Workstation field of an NTLM type 3 message. (CVE-2015-4515)
The Reader View implementation in Mozilla Firefox before 42.0 has an
improper whitelist, which makes it easier for remote attackers to bypass
the Content Security Policy (CSP) protection mechanism and conduct
cross-site scripting (XSS) attacks via vectors involving SVG animations and
the about:reader URL. (CVE-2015-4518)
The Add-on SDK in Mozilla Firefox before 42.0 misinterprets a "script:
false" panel setting, which makes it easier for remote attackers to conduct
cross-site scripting (XSS) attacks via inline JavaScript code that is
executed within a third-party extension. (CVE-2015-7187)
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote
attackers to bypass the Same Origin Policy for an IP address origin, and
conduct cross-site scripting (XSS) attacks, by appending whitespace
characters to an IP address string. (CVE-2015-7188)
Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0
and Firefox ESR 38.x before 38.4 allows remote attackers to execute
arbitrary code or cause a denial of service (heap-based buffer overflow)
via vectors involving a CANVAS element and crafted JavaScript code.
(CVE-2015-7189)
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly
follow the CORS cross-origin request algorithm for the POST method in
situations involving an unspecified Content-Type header manipulation, which
allows remote attackers to bypass the Same Origin Policy by leveraging the
lack of a preflight-request step. (CVE-2015-7193)
Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR
38.x before 38.4 allows remote attackers to cause a denial of service
(application crash) or possibly execute arbitrary code via a crafted ZIP
archive. (CVE-2015-7194)
The URL parsing implementation in Mozilla Firefox before 42.0 improperly
recognizes escaped characters in hostnames within Location headers, which
allows remote attackers to obtain sensitive information via vectors
involving a redirect. (CVE-2015-7195)
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java
plugin is enabled, allow remote attackers to cause a denial of service
(incorrect garbage collection and application crash) or possibly execute
arbitrary code via a crafted Java applet that deallocates an in-use
JavaScript wrapper. (CVE-2015-7196)
Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote
attackers to cause a denial of service (memory corruption) or possibly have
unspecified other impact via crafted texture data. (CVE-2015-7198)
The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate
functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4
lack status checking, which allows remote attackers to cause a denial of
service (memory corruption) or possibly have unspecified other impact via a
crafted SVG document. (CVE-2015-7199)
The CryptoKey interface implementation in Mozilla Firefox before 42.0 and
Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers
to have an unspecified impact via vectors related to a cryptographic key.
(CVE-2015-7200)
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly
control the ability of a web worker to create a WebSocket object, which
allows remote attackers to bypass intended mixed-content restrictions via
crafted JavaScript code. (CVE-2015-7197)
References
- https://bugs.mageia.org/show_bug.cgi?id=17119
- http://www.seamonkey-project.org/releases/seamonkey2.39/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-116/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-117/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-118/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-121/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-122/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-123/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-127/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-128/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-129/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-130/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-131/
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-132/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
SRPMS
5/core
- iceape-2.39-1.mga5