moonlight security update

Moonlight was prone to several security problems:

CVE-2011-0989: modification of read-only values via
RuntimeHelpers.InitializeArray CVE-2011-0990: buffer
overflow due to race condition in in Array.FastCopy
CVE-2011-0991: use-after-free due to DynamicMethod
resurrection CVE-2011-0992: information leak due to
improper thread finalization

Fixed bugs
bnc#667077
VUL-0: Moonlight Multiple Vulnerabilities
CVE#CVE-2011-0989
The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cau
CVE#CVE-2011-0990
Race condition in the FastCopy optimization in the Array.Copy method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to trigger a buffer overflow and modify internal data structures, and c
CVE#CVE-2011-0991
Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to finalizing and then resurrecting a Dy
CVE#CVE-2011-0992
Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service (plugin crash) or obtain sensitive information via vectors related to member data in a resurrected Mon
Selected Binaries
openSUSE Build Service is sponsored by