[SECURITY] Fedora 12 Update: seamonkey-2.0.5-1.fc12

updates at fedoraproject.org updates at fedoraproject.org
Thu Jun 24 16:23:12 UTC 2010


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-10329
2010-06-24 15:46:36
--------------------------------------------------------------------------------

Name        : seamonkey
Product     : Fedora 12
Version     : 2.0.5
Release     : 1.fc12
URL         : http://www.mozilla.org/projects/seamonkey/
Summary     : Web browser, e-mail, news, IRC client, HTML editor
Description :
SeaMonkey is an all-in-one Internet application suite. It includes
a browser, mail/news client, IRC client, JavaScript debugger, and
a tool to inspect the DOM for web pages. It is derived from the
application formerly known as Mozilla Application Suite.

--------------------------------------------------------------------------------
Update Information:

Update to new upstream SeaMonkey version 2.0.5, fixing multiple security issues
detailed in the upstream advisories:    http://www.mozilla.org/security/known-
vulnerabilities/seamonkey20.html#seamonkey2.0.5    CVE-2010-1121 CVE-2010-1200
CVE-2010-1201 CVE-2010-1202 CVE-2010-1203 CVE-2010-0183 CVE-2010-1198
CVE-2010-1196 CVE-2010-1199 CVE-2010-1125 CVE-2010-1197 CVE-2008-5913
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 23 2010 Martin Stransky <stransky at redhat.com> 2.0.5-1
- Update to 2.0.5
* Thu Apr  1 2010 Martin Stransky <stransky at redhat.com> 2.0.4-1
- Update to 2.0.4
* Wed Feb 17 2010 Martin Stransky <stransky at redhat.com> 2.0.3-1
- Update to 2.0.3
* Thu Dec 17 2009 Jan Horak <jhorak at redhat.com> - 2.0.1-1
- Update to 2.0.1
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #577029 - CVE-2010-1121 firefox: arbitrary code execution via memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=577029
  [ 2 ] Bug #590804 - CVE-2010-1200 Mozilla Crashes with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=590804
  [ 3 ] Bug #590810 - CVE-2010-1202 Mozilla Crashes with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=590810
  [ 4 ] Bug #590816 - CVE-2010-1203 Mozilla Crashes with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=590816
  [ 5 ] Bug #590822 - CVE-2010-0183 Mozilla Use-after-free error in nsCycleCollector::MarkRoots()
        https://bugzilla.redhat.com/show_bug.cgi?id=590822
  [ 6 ] Bug #590828 - CVE-2010-1198 Mozilla Freed object reuse across plugin instances
        https://bugzilla.redhat.com/show_bug.cgi?id=590828
  [ 7 ] Bug #590830 - CVE-2010-1196 Mozilla Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal
        https://bugzilla.redhat.com/show_bug.cgi?id=590830
  [ 8 ] Bug #590833 - CVE-2010-1199 Mozilla Integer Overflow in XSLT Node Sorting
        https://bugzilla.redhat.com/show_bug.cgi?id=590833
  [ 9 ] Bug #577584 - CVE-2010-1125 firefox: keystrokes sent to hidden frame rather than visible frame due to javascript flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=577584
  [ 10 ] Bug #590850 - CVE-2010-1197 Mozilla Content-Disposition: attachment ignored if Content-Type: multipart also present
        https://bugzilla.redhat.com/show_bug.cgi?id=590850
  [ 11 ] Bug #480938 - CVE-2008-5913 mozilla: in-session phishing attack
        https://bugzilla.redhat.com/show_bug.cgi?id=480938
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update seamonkey' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list