Summary: | <www-client/{icecat,mozilla-firefox,mozilla-firefox-bin}-3.5.6: Multiple vulnerabilities (CVE-2009-{3388,3389,3979,3982,3983,3984,3985,3986,3987}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Gordon Pettey <petteyg359> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | basic, betelgeuse, bugs, jaak, WineLauncher.Jonathan |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.6 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 297658, 300145 | ||
Bug Blocks: |
Description
Gordon Pettey
2009-12-19 15:48:52 UTC
3.5.6 in main tree. Archies please proceed: =net-libs/xulrunner-1.9.1.6 =www-client/mozilla-firefox-3.5.6 Icecat will be updated in a bit. Bug 297395 seems to be duplicate of this bug. The security bugs are also in www-client/seamonkey-2.0 and fixed in seamonkey-2.0.1 ppc64 done. Had to drag sqlite with this bug too. Please add us back on if you need seamonkey or else done. (In reply to comment #4) > ppc64 done. Had to drag sqlite with this bug too. Please add us back on if you > need seamonkey or else done. > Added a dependency bug for sqlite Go with 3.6.20-r1 *** Bug 297395 has been marked as a duplicate of this bug. *** Stable for HPPA. Stable for PPC. (In reply to comment #1) > 3.5.6 in main tree. > Archies please proceed: > > =net-libs/xulrunner-1.9.1.6 > =www-client/mozilla-firefox-3.5.6 > Both stable on amd64, if you want also icecat, readd us Regards amd64, you forgot mozilla-firefox-bin and you should do icecat in my eyes....or can you stand being less cool than x86 which has icecat stable? x86 stable If I don't misremember, when I marked firefox and xulrunner stable on amd64, firefox-bin was still missing from main tree and, about icecat, I didn't stable it since there were no stable version and HPPA and PPC teams didn't stable it also I will look at them tomorrow if possible (In reply to comment #12) > If I don't misremember, when I marked firefox and xulrunner stable on amd64, > firefox-bin was still missing from main tree and, about icecat, I didn't stable > it since there were no stable version and HPPA and PPC teams didn't stable it > also > > I will look at them tomorrow if possible > There is no need to rush icecat to stable. Any arch that has stable keywords will need to, all others can ignore icecat. There are other bugs mozilla herd has to work out in icecat. remaining ones stable on amd64 alpha/arm/ia64/sparc stable CVE-2009-3388 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388): liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues." CVE-2009-3389 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389): Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions. CVE-2009-3979 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979): Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. CVE-2009-3982 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982): Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. CVE-2009-3983 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983): Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user. CVE-2009-3984 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984): Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body. CVE-2009-3985 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985): Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654. CVE-2009-3986 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986): Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window.opener property. CVE-2009-3987 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987): The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects. Nothing for mozilla team to do here, none of the affected versions/packages are in-tree anymore. Can't this bug be closed since these package versions are no longer in the Portage tree? This issue was resolved and addressed in GLSA 201301-01 at http://security.gentoo.org/glsa/glsa-201301-01.xml by GLSA coordinator Sean Amoss (ackle). |