File _patchinfo of Package patchinfo
<patchinfo>
<issue id="847708" tracker="bnc">MozillaFirefox 25 security release</issue>
<issue id="CVE-2013-5604" tracker="cve" />
<issue id="CVE-2013-5600" tracker="cve" />
<issue id="CVE-2013-5601" tracker="cve" />
<issue id="CVE-2013-5602" tracker="cve" />
<issue id="CVE-2013-5603" tracker="cve" />
<issue id="CVE-2013-5598" tracker="cve" />
<issue id="CVE-2013-5599" tracker="cve" />
<issue id="CVE-2013-5590" tracker="cve" />
<issue id="CVE-2013-5591" tracker="cve" />
<issue id="CVE-2013-5592" tracker="cve" />
<issue id="CVE-2013-5593" tracker="cve" />
<issue id="CVE-2013-5595" tracker="cve" />
<issue id="CVE-2013-5596" tracker="cve" />
<issue id="CVE-2013-5597" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>wrosenauer</packager>
<description>The following security issues were fixed on this major mozilla firefox security release:
- update to SeaMonkey 2.22 (bnc#847708)
* MFSA 2013-93/CVE-2013-5590/CVE-2013-5591/CVE-2013-5592
Miscellaneous memory safety hazards
* MFSA 2013-94/CVE-2013-5593 (bmo#868327)
Spoofing addressbar through SELECT element
* MFSA 2013-95/CVE-2013-5604 (bmo#914017)
Access violation with XSLT and uninitialized data
* MFSA 2013-96/CVE-2013-5595 (bmo#916580)
Improperly initialized memory and overflows in some JavaScript
functions
* MFSA 2013-97/CVE-2013-5596 (bmo#910881)
Writing to cycle collected object during image decoding
* MFSA 2013-98/CVE-2013-5597 (bmo#918864)
Use-after-free when updating offline cache
* MFSA 2013-99/CVE-2013-5598 (bmo#920515)
Security bypass of PDF.js checks using iframes
* MFSA 2013-100/CVE-2013-5599/CVE-2013-5600/CVE-2013-5601
(bmo#915210, bmo#915576, bmo#916685)
Miscellaneous use-after-free issues found through ASAN fuzzing
* MFSA 2013-101/CVE-2013-5602 (bmo#897678)
Memory corruption in workers
* MFSA 2013-102/CVE-2013-5603 (bmo#916404)
Use-after-free in HTML document templates
</description>
<summary>update for seamonkey</summary>
</patchinfo>