File _patchinfo of Package patchinfo.2392

<patchinfo>
  <issue id="854370" tracker="bnc">VUL-0: MozillaFirefox 26/24.2.0 security release</issue>
  <issue id="CVE-2013-6630" tracker="cve" />
  <issue id="CVE-2013-5609" tracker="cve" />
  <issue id="CVE-2013-6671" tracker="cve" />
  <issue id="CVE-2013-6672" tracker="cve" />
  <issue id="CVE-2013-6673" tracker="cve" />
  <issue id="CVE-2013-5613" tracker="cve" />
  <issue id="CVE-2013-5612" tracker="cve" />
  <issue id="CVE-2013-5611" tracker="cve" />
  <issue id="CVE-2013-5610" tracker="cve" />
  <issue id="CVE-2013-5616" tracker="cve" />
  <issue id="CVE-2013-5615" tracker="cve" />
  <issue id="CVE-2013-5614" tracker="cve" />
  <issue id="CVE-2013-5619" tracker="cve" />
  <issue id="CVE-2013-5618" tracker="cve" />
  <issue id="CVE-2013-6629" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>wrosenauer</packager>
  <description>This update fixes the following security issues with SeaMonkey:

- update to SeaMonkey 2.23 (bnc#854370))
  * requires NSPR 4.10.2 and NSS 3.15.3.1
  * MFSA 2013-104/CVE-2013-5609/CVE-2013-5610
    Miscellaneous memory safety hazards
  * MFSA 2013-105/CVE-2013-5611 (bmo#771294)
    Application Installation doorhanger persists on navigation
  * MFSA 2013-106/CVE-2013-5612 (bmo#871161)
    Character encoding cross-origin XSS attack
  * MFSA 2013-107/CVE-2013-5614 (bmo#886262)
    Sandbox restrictions not applied to nested object elements
  * MFSA 2013-108/CVE-2013-5616 (bmo#938341)
    Use-after-free in event listeners
  * MFSA 2013-109/CVE-2013-5618 (bmo#926361)
    Use-after-free during Table Editing
  * MFSA 2013-110/CVE-2013-5619 (bmo#917841)
    Potential overflow in JavaScript binary search algorithms
  * MFSA 2013-111/CVE-2013-6671 (bmo#930281)
    Segmentation violation when replacing ordered list elements
  * MFSA 2013-112/CVE-2013-6672 (bmo#894736)
    Linux clipboard information disclosure though selection paste
  * MFSA 2013-113/CVE-2013-6673 (bmo#970380)
    Trust settings for built-in roots ignored during EV certificate
    validation
  * MFSA 2013-114/CVE-2013-5613 (bmo#930381, bmo#932449)
    Use-after-free in synthetic mouse movement
  * MFSA 2013-115/CVE-2013-5615 (bmo#929261)
    GetElementIC typed array stubs can be generated outside observed
    typesets
  * MFSA 2013-116/CVE-2013-6629/CVE-2013-6630 (bmo#891693)
    JPEG information leak
  * MFSA 2013-117 (bmo#946351)
    Mis-issued ANSSI/DCSSI certificate
    (fixed via NSS 3.15.3.1)
- rebased patches:
  * mozilla-nongnome-proxies.patch
  * mozilla-shared-nss-db.patch
</description>
  <summary>update for seamonkey</summary>
</patchinfo>
openSUSE Build Service is sponsored by