openSUSE: 2011:1290-1: critical: Seamonkey update
Description
Seamonkey was upgraded to version 2.5 in order to fix the following security problems: * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-48/CVE-2011-3651/CVE-2011-3652/CVE-2011-3654 Miscellaneous memory safety hazards * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug * MFSA 2011-52/CVE-2011-3655 (bmo#672182) Code execution via NoWaiverWrapper
Patch
Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch seamonkey-5487 - openSUSE 11.3: zypper in -t patch seamonkey-5487 To bring your system up-to-date, use "zypper patch".
Package List
- openSUSE 11.4 (i586 x86_64) [New Version: 2.5]: seamonkey-2.5-0.2.1 seamonkey-dom-inspector-2.5-0.2.1 seamonkey-irc-2.5-0.2.1 seamonkey-translations-common-2.5-0.2.1 seamonkey-translations-other-2.5-0.2.1 seamonkey-venkman-2.5-0.2.1 - openSUSE 11.3 (i586 x86_64) [New Version: 2.5]: seamonkey-2.5-0.2.1 seamonkey-dom-inspector-2.5-0.2.1 seamonkey-irc-2.5-0.2.1 seamonkey-translations-common-2.5-0.2.1 seamonkey-translations-other-2.5-0.2.1 seamonkey-venkman-2.5-0.2.1
References
https://www.suse.com/security/cve/CVE-2011-2372.html https://www.suse.com/security/cve/CVE-2011-2996.html https://www.suse.com/security/cve/CVE-2011-2998.html https://www.suse.com/security/cve/CVE-2011-2999.html https://www.suse.com/security/cve/CVE-2011-3000.html https://www.suse.com/security/cve/CVE-2011-3001.html https://www.suse.com/security/cve/CVE-2011-3640.html https://www.suse.com/security/cve/CVE-2011-3647.html https://www.suse.com/security/cve/CVE-2011-3648.html https://www.suse.com/security/cve/CVE-2011-3649.html https://www.suse.com/security/cve/CVE-2011-3650.html https://www.suse.com/security/cve/CVE-2011-3651.html https://www.suse.com/security/cve/CVE-2011-3653.html https://www.suse.com/security/cve/CVE-2011-3655.html https://bugzilla.novell.com/728520--