|
Message-ID: <20110406180648.GA3660@suse.de> Date: Wed, 6 Apr 2011 20:06:51 +0200 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Subject: Moonlight release 2.4.1 with security fixes Hi, The Novell Mono developers are just releasing Moonlight (the Mono Silverlight equivalent) security updates for several critical issues. The first 3 issues were reported to the Mono team by Jeroen Frijters (http://www.ikvm.net/). The fixed versions is 2.4.1 for the 2.4 branch and 3.99.3 for the 3.99 (Moonlight 4 preview) branch. The main Novell tracker bug for this update: https://bugzilla.novell.com/show_bug.cgi?id=667077 CVE-2011-0989: modification of read-only values via RuntimeHelpers.InitializeArray https://github.com/mono/mono/commit/035c8587c0d8d307e45f1b7171a0d337bb451f1e The modification of read-only variables (e.g. from outside the sandbox) could be used for breaking out of the moonlight sandboxing. CVE-2011-0990: buffer overflow due to race condition in in Array.FastCopy https://github.com/mono/mono/commit/2f00e4bbb2137130845afb1b2a1e678552fc8e5c Similar to the above, an array element could be changed to a privileged read-only element which would then be overwritten. (So not a lowlevel buffer overflow, but a sandboxing violation/break out.) CVE-2011-0991: use-after-free due to DynamicMethod resurrection https://github.com/mono/mono/commit/8eb1189099e02372fd45ca1c67230eccf1edddc0 https://github.com/mono/mono/commit/89d1455a80ef13cddee5d79ec00c06055da3085c Also fixed in this update: CVE-2011-0992: information leak due to improper thread finalization https://bugzilla.novell.com/show_bug.cgi?id=678515 https://github.com/mono/mono/commit/722f9890f09aadfc37ae479e7d946d5fc5ef7b91 Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.