File _patchinfo of Package patchinfo.2691
<patchinfo>
<issue id="868603" tracker="bnc">VUL-0: MozillaFirefox 28 security release</issue>
<issue id="CVE-2014-1494" tracker="cve" />
<issue id="CVE-2014-1508" tracker="cve" />
<issue id="CVE-2014-1509" tracker="cve" />
<issue id="CVE-2014-1499" tracker="cve" />
<issue id="CVE-2014-1493" tracker="cve" />
<issue id="CVE-2014-1511" tracker="cve" />
<issue id="CVE-2014-1510" tracker="cve" />
<issue id="CVE-2014-1513" tracker="cve" />
<issue id="CVE-2014-1512" tracker="cve" />
<issue id="CVE-2014-1498" tracker="cve" />
<issue id="CVE-2014-1514" tracker="cve" />
<issue id="CVE-2014-1504" tracker="cve" />
<issue id="CVE-2014-1505" tracker="cve" />
<issue id="CVE-2014-1502" tracker="cve" />
<issue id="CVE-2014-1497" tracker="cve" />
<issue id="CVE-2014-1500" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>wrosenauer</packager>
<description>
Mozilla Thunderbird was updated to 24.4.0.
Mozilla SeaMonkey was updated to 2.25.
* MFSA 2014-15/CVE-2014-1493/CVE-2014-1494
Miscellaneous memory safety hazards
* MFSA 2014-17/CVE-2014-1497 (bmo#966311)
Out of bounds read during WAV file decoding
* MFSA 2014-18/CVE-2014-1498 (bmo#935618)
crypto.generateCRMFRequest does not validate type of key
* MFSA 2014-19/CVE-2014-1499 (bmo#961512)
Spoofing attack on WebRTC permission prompt
* MFSA 2014-20/CVE-2014-1500 (bmo#956524)
onbeforeunload and Javascript navigation DOS
* MFSA 2014-22/CVE-2014-1502 (bmo#972622)
WebGL content injection from one domain to rendering in another
* MFSA 2014-23/CVE-2014-1504 (bmo#911547)
Content Security Policy for data: documents not preserved by
session restore
* MFSA 2014-26/CVE-2014-1508 (bmo#963198)
Information disclosure through polygon rendering in MathML
* MFSA 2014-27/CVE-2014-1509 (bmo#966021)
Memory corruption in Cairo during PDF font rendering
* MFSA 2014-28/CVE-2014-1505 (bmo#941887)
SVG filters information disclosure through feDisplacementMap
* MFSA 2014-29/CVE-2014-1510/CVE-2014-1511 (bmo#982906, bmo#982909)
Privilege escalation using WebIDL-implemented APIs
* MFSA 2014-30/CVE-2014-1512 (bmo#982957)
Use-after-free in TypeObject
* MFSA 2014-31/CVE-2014-1513 (bmo#982974)
Out-of-bounds read/write through neutering ArrayBuffer objects
* MFSA 2014-32/CVE-2014-1514 (bmo#983344)
Out-of-bounds write through TypedArrayObject after neutering
</description>
<summary>MozillaThunderbird,seamonkey: security update</summary>
</patchinfo>