Changelog for
seamonkey-2.20-1.16.1.i586.rpm :
* Mon Aug 05 2013 wrAATTrosenauer.org- update to SeaMonkey 2.20 (bnc#833389)
* MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous memory safety hazards
* MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free mutating DOM during SetBody
* MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow when generating CRMF requests
* MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV audio file decoding
* MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI misrepresentation and masquerading
* MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests allow for code execution and XSS attacks
* MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of XrayWrappers using XBL Scopes
* MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal used for validating URI for some Javascript components
* MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin bypass with web workers and XMLHttpRequest
* MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397) Local Java applets may read contents of local file system- requires NSPR 4.10 and NSS 3.15- removed obsolete seamonkey-shared-nss-db.patch
* Sat Jun 29 2013 wrAATTrosenauer.org- update to SeaMonkey 2.19 (bnc#825935)
* removed obsolete patches + mozilla-gstreamer-760140.patch
* GStreamer support does not build on 12.1 anymore (build only on 12.2 and later)
* MFSA 2013-49/CVE-2013-1682/CVE-2013-1683 Miscellaneous memory safety hazards
* MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686 Memory corruption found using Address Sanitizer
* MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823) Privileged content access and execution via XBL
* MFSA 2013-52/CVE-2013-1688 (bmo#873966) Arbitrary code execution within Profiler
* MFSA 2013-53/CVE-2013-1690 (bmo#857883) Execution of unmapped memory through onreadystatechange event
* MFSA 2013-54/CVE-2013-1692 (bmo#866915) Data in the body of XHR HEAD requests leads to CSRF attacks
* MFSA 2013-55/CVE-2013-1693 (bmo#711043) SVG filters can lead to information disclosure
* MFSA 2013-56/CVE-2013-1694 (bmo#848535) PreserveWrapper has inconsistent behavior
* MFSA 2013-57/CVE-2013-1695 (bmo#849791) Sandbox restrictions not applied to nested frame elements
* MFSA 2013-58/CVE-2013-1696 (bmo#761667) X-Frame-Options ignored when using server push with multi-part responses
* MFSA 2013-59/CVE-2013-1697 (bmo#858101) XrayWrappers can be bypassed to run user defined methods in a privileged context
* MFSA 2013-60/CVE-2013-1698 (bmo#876044) getUserMedia permission dialog incorrectly displays location
* MFSA 2013-61/CVE-2013-1699 (bmo#840882) Homograph domain spoofing in .com, .net and .name
* Tue May 28 2013 wrAATTrosenauer.org- update to SeaMonkey 2.17.1
* Tue Apr 09 2013 wrAATTrosenauer.org- revert to use GStreamer 0.10 on 12.3 (bnc#814101)
* Tue Apr 02 2013 wrAATTrosenauer.org- update to SeaMonkey 2.17 (bnc#813026)
* requires NSPR 4.9.5 and NSS 3.14.3
* mozilla-webrtc-ppc.patch included upstream
* MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous memory safety hazards
* MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds write in Cairo library
* MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash with Mesa graphics driver on Linux
* MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW protections allows cloning of protected nodes
* MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of tab-modal dialog origin disclosure
* MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site scripting (XSS) using timed history navigations
* MFSA 2013-39/CVE-2013-0792 (bmo#722831) Memory corruption while rendering grayscale PNG images- use GStreamer 1.0 starting with 12.3 (mozilla-gstreamer-1.patch)
* Fri Mar 15 2013 pcernyAATTsuse.com- update to SeaMonkey 2.16.2
* Sat Mar 09 2013 wrAATTrosenauer.org- update to SeaMonkey 2.16.1 (bnc#808243)
* MFSA 2013-29/CVE-2013-0787 (bmo#848644) Use-after-free in HTML Editor
* Mon Feb 18 2013 wrAATTrosenauer.org- update to SeaMonkey 2.16 (bnc#804248)
* MFSA 2013-21/CVE-2013-0783/2013-0784 Miscellaneous memory safety hazards
* MFSA 2013-22/CVE-2013-0772 (bmo#801366) Out-of-bounds read in image rendering
* MFSA 2013-23/CVE-2013-0765 (bmo#830614) Wrapped WebIDL objects can be wrapped again
* MFSA 2013-24/CVE-2013-0773 (bmo#809652) Web content bypass of COW and SOW security wrappers
* MFSA 2013-25/CVE-2013-0774 (bmo#827193) Privacy leak in JavaScript Workers
* MFSA 2013-26/CVE-2013-0775 (bmo#831095) Use-after-free in nsImageLoadingContent
* MFSA 2013-27/CVE-2013-0776 (bmo#796475) Phishing on HTTPS connection through malicious proxy
* MFSA 2013-28/CVE-2013-0780/CVE-2013-0782/CVE-2013-0777/ CVE-2013-0778/CVE-2013-0779/CVE-2013-0781 Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer- removed obsolete patches
* mozilla-webrtc.patch
* mozilla-gstreamer-803287.patch
* Mon Feb 04 2013 wrAATTrosenauer.org- update to SeaMonkey 2.15.2
* Applications could not be removed from the \"Application details\" dialog under Preferences, Helper Applications (bmo#826771).
* View / Message Body As could show menu items out of context (bmo#831348)
* Sun Jan 20 2013 wrAATTrosenauer.org- update to SeaMonkey 2.15.1
* backed out bmo#677092 (removed patch)
* fixed problems involving HTTP proxy transactions
* Sun Jan 13 2013 wrAATTrosenauer.org- backed out restartless language packs as it broke multi-locale setup (bmo#677092, bmo#818468)
* Tue Jan 08 2013 wrAATTrosenauer.org- update to SeaMonkey 2.15 (bnc#796895)
* MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770 Miscellaneous memory safety hazards
* MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0767 CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829 Use-after-free and buffer overflow issues found using Address Sanitizer
* MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow in Canvas
* MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in addressbar during page loads
* MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free when displaying table with many columns and column groups
* MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are shared across iframes
* MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to handling of SSL on threads
* MFSA 2013-08/CVE-2013-0745 (bmo#794158) AutoWrapperChanger fails to keep objects alive during garbage collection
* MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment mismatch with quickstubs returned values
* MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event manipulation in plugin handler to bypass same-origin policy
* MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space layout leaked in XBL objects
* MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow in Javascript string concatenation
* MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption in XBL with XML bindings containing SVG
* MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object Wrapper (COW) bypass through changing prototype
* MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege escalation through plugin objects
* MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in serializeToStream
* MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in ListenerManager
* MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in Vibrate
* MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in Javascript Proxy objects- requires NSS 3.14.1 (MFSA 2013-20, CVE-2013-0743)- reenable WebRTC- added mozilla-libproxy-compat.patch for libproxy API compat on openSUSE 11.2 and earlier
* Tue Dec 18 2012 wrAATTrosenauer.org- update to SeaMonkey 2.14.1
* fix regressions from 2.14 release
* Tue Nov 20 2012 wrAATTrosenauer.org- update to SeaMonkey 2.14 (bnc#790140)
* MFSA 2012-91/CVE-2012-5842/CVE-2012-5843 Miscellaneous memory safety hazards
* MFSA 2012-92/CVE-2012-4202 (bmo#758200) Buffer overflow while rendering GIF images
* MFSA 2012-93/CVE-2012-4201 (bmo#747607) evalInSanbox location context incorrectly applied
* MFSA 2012-94/CVE-2012-5836 (bmo#792857) Crash when combining SVG text on path with CSS
* MFSA 2012-96/CVE-2012-4204 (bmo#778603) Memory corruption in str_unescape
* MFSA 2012-97/CVE-2012-4205 (bmo#779821) XMLHttpRequest inherits incorrect principal within sandbox
* MFSA 2012-99/CVE-2012-4208 (bmo#798264) XrayWrappers exposes chrome-only properties when not in chrome compartment
* MFSA 2012-100/CVE-2012-5841 (bmo#805807) Improper security filtering for cross-origin wrappers
* MFSA 2012-101/CVE-2012-4207 (bmo#801681) Improper character decoding in HZ-GB-2312 charset
* MFSA 2012-103/CVE-2012-4209 (bmo#792405) Frames can shadow top.location
* MFSA 2012-105/CVE-2012-4214/CVE-2012-4215/CVE-2012-4216/ CVE-2012-5829/CVE-2012-5839/CVE-2012-5840/CVE-2012-4212/ CVE-2012-4213/CVE-2012-4217/CVE-2012-4218 Use-after-free and buffer overflow issues found using Address Sanitizer
* MFSA 2012-106/CVE-2012-5830/CVE-2012-5833/CVE-2012-5835/CVE-2012-5838 Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer- rebased patches- disabled WebRTC since build is broken (bmo#776877)
* Sat Oct 27 2012 wrAATTrosenauer.org- update to SeaMonkey 2.13.2 (bnc#786522)
* MFSA 2012-90/CVE-2012-4194/CVE-2012-4195/CVE-2012-4196 (bmo#800666, bmo#793121, bmo#802557) Fixes for Location object issues
* Fri Oct 12 2012 wrAATTrosenauer.org- update to SeaMonkey 2.13.1 (bnc#783533)
* MFSA 2012-88/CVE-2012-4191 (bmo#798045) Miscellaneous memory safety hazards
* MFSA 2012-89/CVE-2012-4192/CVE-2012-4193 (bmo#799952, bmo#720619) defaultValue security checks not applied
* Mon Oct 08 2012 wrAATTrosenauer.org- update to SeaMonkey 2.13 (bnc#783533)
* MFSA 2012-74/CVE-2012-3982/CVE-2012-3983 Miscellaneous memory safety hazards
* MFSA 2012-75/CVE-2012-3984 (bmo#575294) select element persistance allows for attacks
* MFSA 2012-76/CVE-2012-3985 (bmo#655649) Continued access to initial origin after setting document.domain
* MFSA 2012-77/CVE-2012-3986 (bmo#775868) Some DOMWindowUtils methods bypass security checks
* MFSA 2012-79/CVE-2012-3988 (bmo#725770) DOS and crash with full screen and history navigation
* MFSA 2012-80/CVE-2012-3989 (bmo#783867) Crash with invalid cast when using instanceof operator
* MFSA 2012-81/CVE-2012-3991 (bmo#783260) GetProperty function can bypass security checks
* MFSA 2012-82/CVE-2012-3994 (bmo#765527) top object and location property accessible by plugins
* MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370) Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties
* MFSA 2012-84/CVE-2012-3992 (bmo#775009) Spoofing and script injection through location.hash
* MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/ CVE-2012-4181/CVE-2012-4182/CVE-2012-4183 Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer
* MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/ CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer
* MFSA 2012-87/CVE-2012-3990 (bmo#787704) Use-after-free in the IME State Manager- requires NSPR 4.9.2- improve GStreamer integration (bmo#760140)
* Mon Sep 10 2012 wrAATTrosenauer.org- update to SeaMonkey 2.12.1 (bnc#779936)
* Sites visited while in Private Browsing mode could be found through manual browser cache inspection (bmo#787743)
* Mon Aug 27 2012 wrAATTrosenauer.org- update to SeaMonkey 2.12 (bnc#777588)
* MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety hazards
* MFSA 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1975 CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-2012-3959 CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-2012-3964 Use-after-free issues found using Address Sanitizer
* MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object can be shadowed using Object.defineProperty
* MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793) Memory corruption with bitmap format images with negative height
* MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL use-after-free and memory corruption
* MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer overflow and use-after-free issues
* MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption
* MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds read in format-number in XSLT
* MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads linked resources in extensions when parsing text/html
* MFSA 2012-69/CVE-2012-3976 (bmo#768568) Incorrect site SSL certificate data display
* MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object security checks bypassed by chrome code- enable GStreamer for 12.1 and higher- use internal libjpeg
* Sun Jul 29 2012 wrAATTrosenauer.org- import PPC patch from Firefox:
* add patches for bmo#750620 and bmo#746112
* fix xpcshell segfault on ppc
* Mon Jul 16 2012 wrAATTrosenauer.org- update to Seamonkey 2.11 (bnc#771583)
* MFSA 2012-42/CVE-2012-1949/CVE-2012-1948 Miscellaneous memory safety hazards
* MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952 Gecko memory corruption
* MFSA 2012-45/CVE-2012-1955 (bmo#757376) Spoofing issue with location
* MFSA 2012-47/CVE-2012-1957 (bmo#750096) Improper filtering of javascript in HTML feed-view
* MFSA 2012-48/CVE-2012-1958 (bmo#750820) use-after-free in nsGlobalWindow::PageHidden
* MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559) Same-compartment Security Wrappers can be bypassed
* MFSA 2012-50/CVE-2012-1960 (bmo#761014) Out of bounds read in QCMS
* MFSA 2012-51/CVE-2012-1961 (bmo#761655) X-Frame-Options header ignored when duplicated
* MFSA 2012-52/CVE-2012-1962 (bmo#764296) JSDependentString::undepend string conversion results in memory corruption
* MFSA 2012-53/CVE-2012-1963 (bmo#767778) Content Security Policy 1.0 implementation errors cause data leakage
* MFSA 2012-56/CVE-2012-1967 (bmo#758344) Code execution through javascript: URLs
* relicensed to MPL-2.0- updated/removed patches- requires NSS 3.13.5
* Fri Jun 15 2012 wrAATTrosenauer.org- update to Seamonkey 2.10.1
* Mon Jun 04 2012 wrAATTrosenauer.org- update to Seamonkey 2.10 (bnc#765204)
* MFSA 2012-34/CVE-2012-1938/CVE-2012-1937/CVE-2011-3101 Miscellaneous memory safety hazards
* MFSA 2012-36/CVE-2012-1944 (bmo#751422) Content Security Policy inline-script bypass
* MFSA 2012-37/CVE-2012-1945 (bmo#670514) Information disclosure though Windows file shares and shortcut files
* MFSA 2012-38/CVE-2012-1946 (bmo#750109) Use-after-free while replacing/inserting a node in a document
* MFSA 2012-40/CVE-2012-1947/CVE-2012-1940/CVE-2012-1941 Buffer overflow and use-after-free issues found using Address Sanitizer- requires NSS 3.13.4
* MFSA 2012-39/CVE-2012-0441 (bmo#715073)
* Mon Apr 30 2012 wrAATTrosenauer.org- update to Seamonkey 2.9.1
* fix regressions - POP3 filters (bmo#748090) - Message Body not loaded when using \"Fetch Headers Only\" (bmo#748865) - Received messages contain parts of other messages with movemail account (bmo#748726) - New mail notification issue (bmo#748997) - crash in nsMsgDatabase::MatchDbName (bmo#748432)
* Fri Apr 27 2012 wrAATTrosenauer.org- fixed build with gcc 4.7
* Mon Apr 23 2012 wrAATTrosenauer.org- update to Seamonkey 2.9 (bnc#758408)
* MFSA 2012-20/CVE-2012-0467/CVE-2012-0468 Miscellaneous memory safety hazards
* MFSA 2012-22/CVE-2012-0469 (bmo#738985) use-after-free in IDBKeyRange
* MFSA 2012-23/CVE-2012-0470 (bmo#734288) Invalid frees causes heap corruption in gfxImageSurface
* MFSA 2012-24/CVE-2012-0471 (bmo#715319) Potential XSS via multibyte content processing errors
* MFSA 2012-25/CVE-2012-0472 (bmo#744480) Potential memory corruption during font rendering using cairo-dwrite
* MFSA 2012-26/CVE-2012-0473 (bmo#743475) WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error
* MFSA 2012-27/CVE-2012-0474 (bmo#687745, bmo#737307) Page load short-circuit can lead to XSS
* MFSA 2012-28/CVE-2012-0475 (bmo#694576) Ambiguous IPv6 in Origin headers may bypass webserver access restrictions
* MFSA 2012-29/CVE-2012-0477 (bmo#718573) Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues
* MFSA 2012-30/CVE-2012-0478 (bmo#727547) Crash with WebGL content using textImage2D
* MFSA 2012-31/CVE-2011-3062 (bmo#739925) Off-by-one error in OpenType Sanitizer
* MFSA 2012-32/CVE-2011-1187 (bmo#624621) HTTP Redirections and remote content can be read by javascript errors
* MFSA 2012-33/CVE-2012-0479 (bmo#714631) Potential site identity spoofing when loading RSS and Atom feeds
* Sat Apr 21 2012 wrAATTrosenauer.org- update to 2.9b4- added mozilla-sle11.patch and add exceptions to be able to build for SLE11/11.1- exclude broken gl locale from build- fixed build on 11.2-x86_64 by adding mozilla-revert_621446.patch- added mozilla-gcc47.patch and mailnews-literals.patch to fix compilation issues with recent gcc 4.7
* Tue Mar 13 2012 wrAATTrosenauer.org- update to Seamonkey 2.8 (bnc#750044)
* MFSA 2012-13/CVE-2012-0455 (bmo#704354) XSS with Drag and Drop and Javascript: URL
* MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103) SVG issues found with Address Sanitizer
* MFSA 2012-15/CVE-2012-0451 (bmo#717511) XSS with multiple Content Security Policy headers
* MFSA 2012-16/CVE-2012-0458 Escalation of privilege with Javascript: URL as home page
* MFSA 2012-17/CVE-2012-0459 (bmo#723446) Crash when accessing keyframe cssText after dynamic modification
* MFSA 2012-18/CVE-2012-0460 (bmo#727303) window.fullScreen writeable by untrusted content
* MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/ CVE-2012-0463 Miscellaneous memory safety hazards- explicitely build-require X libs
* Thu Feb 16 2012 wrAATTrosenauer.org- update to Seamonkey 2.7.2 (bnc#747328)
* CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow
* Thu Feb 09 2012 wrAATTrosenauer.org- update to Seamonkey 2.7.1 (bnc#746616)
* MFSA 2012-10/CVE-2012-0452 (bmo#724284) use after free in nsXBLDocumentInfo::ReadPrototypeBindings- Use YARR interpreter instead of PCRE on platforms where YARR JIT is not supported, since PCRE doesnt build (bmo#691898)- fix ppc64 build (bmo#703534)
* Tue Jan 31 2012 wrAATTrosenauer.org- update to Seamonkey 2.7 (bnc#744275)
* MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards
* MFSA 2012-03/CVE-2012-0445 (bmo#701071)