SUSE 5020 Published by

A Seamonkey update has been released for both openSUSE 11.3 and 11.4



______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:1290-1
Rating: critical
References: #728520
Cross-References: CVE-2011-2372 CVE-2011-2996 CVE-2011-2998
CVE-2011-2999 CVE-2011-3000 CVE-2011-3001
CVE-2011-3640 CVE-2011-3647 CVE-2011-3648
CVE-2011-3649 CVE-2011-3650 CVE-2011-3651
CVE-2011-3653 CVE-2011-3655
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________

An update that fixes 14 vulnerabilities is now available.
It includes one version update.

Description:

Seamonkey was upgraded to version 2.5 in order to fix the
following security problems:

* MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS
against sites using Shift-JIS

* MFSA 2011-48/CVE-2011-3651/CVE-2011-3652/CVE-2011-3654
Miscellaneous memory safety hazards

* MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption
while profiling using Firebug

* MFSA 2011-52/CVE-2011-3655 (bmo#672182) Code execution
via NoWaiverWrapper


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch seamonkey-5487

- openSUSE 11.3:

zypper in -t patch seamonkey-5487

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64) [New Version: 2.5]:

seamonkey-2.5-0.2.1
seamonkey-dom-inspector-2.5-0.2.1
seamonkey-irc-2.5-0.2.1
seamonkey-translations-common-2.5-0.2.1
seamonkey-translations-other-2.5-0.2.1
seamonkey-venkman-2.5-0.2.1

- openSUSE 11.3 (i586 x86_64) [New Version: 2.5]:

seamonkey-2.5-0.2.1
seamonkey-dom-inspector-2.5-0.2.1
seamonkey-irc-2.5-0.2.1
seamonkey-translations-common-2.5-0.2.1
seamonkey-translations-other-2.5-0.2.1
seamonkey-venkman-2.5-0.2.1


References:

http://support.novell.com/security/cve/CVE-2011-2372.html
http://support.novell.com/security/cve/CVE-2011-2996.html
http://support.novell.com/security/cve/CVE-2011-2998.html
http://support.novell.com/security/cve/CVE-2011-2999.html
http://support.novell.com/security/cve/CVE-2011-3000.html
http://support.novell.com/security/cve/CVE-2011-3001.html
http://support.novell.com/security/cve/CVE-2011-3640.html
http://support.novell.com/security/cve/CVE-2011-3647.html
http://support.novell.com/security/cve/CVE-2011-3648.html
http://support.novell.com/security/cve/CVE-2011-3649.html
http://support.novell.com/security/cve/CVE-2011-3650.html
http://support.novell.com/security/cve/CVE-2011-3651.html
http://support.novell.com/security/cve/CVE-2011-3653.html
http://support.novell.com/security/cve/CVE-2011-3655.html
https://bugzilla.novell.com/728520