Updated iceape packages fix security vulnerability
Publication date: 20 Feb 2017Modification date: 20 Feb 2017
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-2827 , CVE-2016-5257 , CVE-2016-5270 , CVE-2016-5271 , CVE-2016-5272 , CVE-2016-5274 , CVE-2016-5276 , CVE-2016-5277 , CVE-2016-5278 , CVE-2016-5280 , CVE-2016-5281 , CVE-2016-5284
Description
Updated Iceape packages derived from Seamonkey include security fixes from Mozilla Firefox: Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Seamonkey before 2.46 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion. (CVE-2016-5270) The PropertyProvider::GetSpacingInternal function in Seamonkey before 2.46 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property. (CVE-2016-5271) The nsImageGeometryMixin class in Seamonkey before 2.46 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site. (CVE-2016-5272) Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Seamonkey before 2.46 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute. (CVE-2016-5276) Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Seamonkey before 2.46 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation. (CVE-2016-5274) Use-after-free vulnerability in the nsRefreshDriver::Tick function in Seamonkey before 2.46 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation. (CVE-2016-5277) Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Seamonkey before 2.46 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image. (CVE-2016-5278) Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Seamonkey before 2.46 allows remote attackers to execute arbitrary code via bidirectional text. (CVE-2016-5280) Use-after-free vulnerability in the DOMSVGLength class in Seamonkey before 2.46 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document. (CVE-2016-5281) Seamonkey before 2.46 relies on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority. (CVE-2016-5284) Multiple unspecified vulnerabilities in the browser engine in Seamonkey before 2.46 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2016-5257)
References
- https://bugs.mageia.org/show_bug.cgi?id=20025
- https://www.mozilla.org/en-US/security/advisories/mfsa2016-85/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2827
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5271
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284
SRPMS
5/core
- iceape-2.46-1.mga5