Bug 855516

Summary: VUL-0: MozillaFirefox 26 security release
Product: [openSUSE] openSUSE 13.1 Reporter: Christopher Yeleighton <giecrilj>
Component: FirefoxAssignee: E-mail List <bnc-team-mozilla>
Status: RESOLVED DUPLICATE QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None    
Version: Final   
Target Milestone: ---   
Hardware: i686   
OS: openSUSE 13.1   
URL: http://www.mozilla.org/security/known-vulnerabilities/firefox.html
Whiteboard:
Found By: Community User Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Christopher Yeleighton 2013-12-15 11:38:43 UTC
User-Agent:       Mozilla/5.0 (X11; Linux i686; rv:25.0) Gecko/20100101 Firefox/25.0 SeaMonkey/2.22.1

Fixed in Firefox 26:

MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate
MFSA 2013-116 JPEG information leak
MFSA 2013-115 GetElementIC typed array stubs can be generated outside observed typesets
MFSA 2013-114 Use-after-free in synthetic mouse movement
MFSA 2013-113 Trust settings for built-in roots ignored during EV certificate validation
MFSA 2013-112 Linux clipboard information disclosure though selection paste
MFSA 2013-111 Segmentation violation when replacing ordered list elements
MFSA 2013-110 Potential overflow in JavaScript binary search algorithms
MFSA 2013-109 Use-after-free during Table Editing
MFSA 2013-108 Use-after-free in event listeners
MFSA 2013-107 Sandbox restrictions not applied to nested object elements
MFSA 2013-106 Character encoding cross-origin XSS attack
MFSA 2013-105 Application Installation doorhanger persists on navigation
MFSA 2013-104 Miscellaneous memory safety hazards (rv:26.0 / rv:24.2)

Reproducible: Always

Steps to Reproduce:
  1. Tell SeaMonkey to navigate to <URL: http://www.seamonkey.pl/start/ >.

Actual Results:  
  1. 
Używasz SeaMonkey w wersji 2.22.1. Najnowszą stabilną wersją SeaMonkey jest za to wersja 2.23. Ze wzgledów bezpieczeństwa zalecamy niezwłoczną aktualizację!

Expected Results:  
  1. No warning.
Comment 1 Marcus Meissner 2013-12-15 19:00:39 UTC
we have a bug open for it, thanks. that should have been public though.

*** This bug has been marked as a duplicate of bug 854370 ***