Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 130269 - www-client/seamonkey: multiple vulnerabilities
Summary: www-client/seamonkey: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High enhancement (vote)
Assignee: Gentoo Security
URL: http://www.mozilla.org/projects/seamo...
Whiteboard: ~2 [ebuild+ masked] DerCorny
Keywords:
: 135285 (view as bug list)
Depends on:
Blocks:
 
Reported: 2006-04-17 09:51 UTC by Florian Steinel
Modified: 2006-06-19 11:27 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
seamonkey-1.0.1.ebuild (seamonkey-1.0.1.ebuild,9.31 KB, text/plain)
2006-05-02 19:27 UTC, Lars Wendler (Polynomial-C) (RETIRED)
no flags Details
seamonkey-1.0-r1--1.0.1_ebuild.diff (seamonkey-1.0-r1--1.0.1_ebuild.diff,1.56 KB, patch)
2006-05-02 19:28 UTC, Lars Wendler (Polynomial-C) (RETIRED)
no flags Details | Diff
CVE-2006-1993.diff (CVE-2006-1993.diff,6.25 KB, patch)
2006-05-02 19:31 UTC, Lars Wendler (Polynomial-C) (RETIRED)
no flags Details | Diff
seamonkey-1.0.2.ebuild (seamonkey-1.0.2.ebuild,9.70 KB, text/plain)
2006-05-20 11:03 UTC, Florian Steinel
no flags Details
005_mozilla-firefox-1.1a2-ia64.patch (005_mozilla-firefox-1.1a2-ia64.patch,2.45 KB, patch)
2006-05-20 11:06 UTC, Florian Steinel
no flags Details | Diff
seamonkey-1.0.1-1.0.2.diff.bz2 (seamonkey-1.0.1-1.0.2.diff.bz2,157.33 KB, application/octet-stream)
2006-05-20 11:31 UTC, Florian Steinel
no flags Details
seamonkey-1.0.2.ebuild (seamonkey-1.0.2.ebuild,9.69 KB, text/plain)
2006-05-20 11:49 UTC, Florian Steinel
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Florian Steinel 2006-04-17 09:51:23 UTC
please revbump seamonkey to version 1.0.1 .

The following patches from the seamonkey-1.0-patches-0.4.tar.bz2 file can be dropped:
./patch/065_firefox-1.5-nsStackFrameUnix.patch.bz2
./patch/066_firefox-1.5-nsStackFrameUnix.patch.bz2
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-17 10:29:26 UTC
Mozilla team, please provide new ebuilds, thank you.

Fixed in SeaMonkey 1.0.1
MFSA 2006-29 Spoofing with translucent windows
MFSA 2006-28 Security check of js_ValueToFunctionObject() can be circumvented
MFSA 2006-26 Mail Multiple Information Disclosure
MFSA 2006-25 Privilege escalation through Print Preview
MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest
MFSA 2006-23 File stealing by changing input type
MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability
MFSA 2006-20 Crashes with evidence of memory corruption (rv:1.8.0.2)
Comment 2 Jory A. Pratt 2006-04-18 15:44:49 UTC
(In reply to comment #1)
> Mozilla team, please provide new ebuilds, thank you.
> 
> Fixed in SeaMonkey 1.0.1
> MFSA 2006-29 Spoofing with translucent windows
> MFSA 2006-28 Security check of js_ValueToFunctionObject() can be circumvented
> MFSA 2006-26 Mail Multiple Information Disclosure
> MFSA 2006-25 Privilege escalation through Print Preview
> MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest
> MFSA 2006-23 File stealing by changing input type
> MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability

Ebuild will be avaliable when I have time to work on it. As package is masked as of right now there is no rush we have 45 days.
> MFSA 2006-20 Crashes with evidence of memory corruption (rv:1.8.0.2)
> 

Comment 4 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2006-05-02 19:27:47 UTC
Created attachment 86039 [details]
seamonkey-1.0.1.ebuild
Comment 5 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2006-05-02 19:28:51 UTC
Created attachment 86040 [details, diff]
seamonkey-1.0-r1--1.0.1_ebuild.diff
Comment 6 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2006-05-02 19:31:16 UTC
Created attachment 86041 [details, diff]
CVE-2006-1993.diff

This patch fixes http://bugs.gentoo.org/show_bug.cgi?id=131138 which also affects seamonkey-1.0.1. The patch can be found at https://bugzilla.mozilla.org/show_bug.cgi?id=334515#c31 
(direct link: https://bugzilla.mozilla.org/attachment.cgi?id=219958&action=view )
Comment 7 Mathy Vanvoorden 2006-05-13 04:06:16 UTC
WFM
Comment 8 Thierry Carrez (RETIRED) gentoo-dev 2006-05-14 09:52:32 UTC
Moz team: time to patch it :)
Comment 9 Thierry Carrez (RETIRED) gentoo-dev 2006-05-14 10:06:55 UTC
Was already masked, now the maskline states there are unsolved security problems with it. Setting to enhancements so that it gets out of main scope, until such time it is resolved.
Comment 10 Florian Steinel 2006-05-20 11:03:23 UTC
Created attachment 87136 [details]
seamonkey-1.0.2.ebuild

The upcoming seamonkey 1.0.2
http://weblogs.mozillazine.org/seamonkey-qa/archives/2006/05/smoketests_for_upcoming_seamon.html
Comment 11 Florian Steinel 2006-05-20 11:06:54 UTC
Created attachment 87137 [details, diff]
005_mozilla-firefox-1.1a2-ia64.patch

005_mozilla-firefox-1.1a2-ia64.patch minus the mozilla/js/src/fdlibm/fdlibm.h part, as it is already included in seamonkey-1.0.2.
Comment 12 Florian Steinel 2006-05-20 11:31:19 UTC
Created attachment 87139 [details]
seamonkey-1.0.1-1.0.2.diff.bz2

diff seamonkey from 1.0.1 to 1.0.2 :
checkout start: Sat May 20 14:09:05 CEST 2006
Comment 13 Florian Steinel 2006-05-20 11:34:27 UTC
Comment on attachment 87136 [details]
seamonkey-1.0.2.ebuild

correct MIME Type
Comment 14 Florian Steinel 2006-05-20 11:49:33 UTC
Created attachment 87140 [details]
seamonkey-1.0.2.ebuild

(propper access to DISTDIR)
Comment 15 Jory A. Pratt 2006-05-21 11:06:04 UTC
Update is in the tree, still p.mask so noone needs to worry about marking stable.
Comment 16 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2006-05-22 06:06:07 UTC
Jory, you forgot to add the CVE-2003-1993 patch. So seamonkey is still vulnerable against http://www.securident.com/vuln/ffdos.htm

Poly-C
Comment 17 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2006-05-22 06:09:42 UTC
whoops, I meant CVE-2006-1993 patch, not CVE-2003-1993
Comment 18 Paulo J. Matos 2006-05-29 16:25:43 UTC
Curious if 1.0.2 of 2006-05-20 11:49 PST ebuild is safe against vulnerabilities...
Comment 19 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-02 11:24:40 UTC
*** Bug 135285 has been marked as a duplicate of this bug. ***
Comment 20 Jesse Adelman 2006-06-02 12:51:47 UTC
Hmm... Perhaps I'm not seeing the big picture here, but the last ebuild here goes through a lot of hoops to patch the 1.0.1 tarball from upstream (see the 'MY_PV="1.0.1"' in the last ebuild here - attachment 87140 [details]), while the bug in Comment #19 marked as a "duplicate" is focused on the new, no-patch-needed tarball released today - http://ftp.mozilla.org/pub/mozilla.org/seamonkey/releases/1.0.2/seamonkey-1.0.2.en-US.linux-i686.tar.gz .

Why was the other bug marked as a duplicate, and this "Resolved:Fixed", when it really seems that this bug is just no longer relevant because of the supported solution which Upstream is providing?
Comment 21 Jesse Adelman 2006-06-02 12:55:08 UTC
Ah, apparently the duplicate bug's solution is the same as this bugs, patching the 1.0.1 release with custom patchsets. Apologies.

(In reply to comment #20)
> Hmm... Perhaps I'm not seeing the big picture here, but the last ebuild here
> goes through a lot of hoops to patch the 1.0.1 tarball from upstream (see the
> 'MY_PV="1.0.1"' in the last ebuild here - attachment 87140 [details] [edit]), while the bug in
> Comment #19 marked as a "duplicate" is focused on the new, no-patch-needed
> tarball released today -
> http://ftp.mozilla.org/pub/mozilla.org/seamonkey/releases/1.0.2/seamonkey-1.0.2.en-US.linux-i686.tar.gz
> .
> 
> Why was the other bug marked as a duplicate, and this "Resolved:Fixed", when it
> really seems that this bug is just no longer relevant because of the supported
> solution which Upstream is providing?
> 

Comment 22 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-02 13:16:59 UTC
Jesse, I marked it as a dupe when I saw version 1.0.2 in both bug reports. 

Also seamonkey is still masked so security wise we're not going to force an upgrade. If you want your initial report to be handled as a normal non-security bug (Gentoo Linux bugzilla product rather than Gentoo Linux) handled by package maintainers you're free to reopen.