[SECURITY] Fedora 8 Update: seamonkey-1.1.13-1.fc8

updates at fedoraproject.org updates at fedoraproject.org
Fri Nov 14 12:50:28 UTC 2008


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33
--------------------------------------------------------------------------------

Name        : seamonkey
Product     : Fedora 8
Version     : 1.1.13
Release     : 1.fc8
URL         : http://www.mozilla.org/projects/seamonkey/
Summary     : Web browser, e-mail, news, IRC client, HTML editor
Description :
SeaMonkey is an all-in-one Internet application suite. It includes
a browser, mail/news client, IRC client, JavaScript debugger, and
a tool to inspect the DOM for web pages. It is derived from the
application formerly known as Mozilla Application Suite.

--------------------------------------------------------------------------------
Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.    This update has been rated as having critical
security impact by the Fedora Security Response Team.    Mozilla Firefox is an
open source Web browser.    Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)    Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)    A flaw was found
in the way Firefox opened "file:" URIs. If a file: URI was loaded in the same
tab as a chrome or privileged "about:" page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].    All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.    [1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov 13 2008 Christopher Aillon <caillon at redhat.com> - 1.1.13-1
- Update to 1.1.13
* Thu Sep 25 2008 Christopher Aillon <caillon at redhat.com> - 1.1.12-1
- Update to 1.1.12
* Tue Jul 15 2008 Christopher Aillon <caillon at redhat.com> - 1.1.11-1
- Update to 1.1.11
* Tue Jul  8 2008 Christopher Aillon <caillon at redhat.com> - 1.1.10-1
- Update to 1.1.10
- Use bullet characters to match GTK+
* Thu Apr 17 2008 Kai Engert <kengert at redhat.com> - 1.1.9-2
- add several upstream patches, not yet released:
  425576 (crash), 323508, 378132, 390295, 421622
* Fri Mar 28 2008 Kai Engert <kengert at redhat.com> - 1.1.9-1
- SeaMonkey 1.1.9
* Fri Feb  8 2008 Kai Engert <kengert at redhat.com> - 1.1.8-1
- SeaMonkey 1.1.8
* Sun Dec  2 2007 Kai Engert <kengert at redhat.com> - 1.1.7-1
- SeaMonkey 1.1.7
* Mon Nov  5 2007 Kai Engert <kengert at redhat.com> - 1.1.6-1
- SeaMonkey 1.1.6
* Fri Oct 19 2007 Kai Engert <kengert at redhat.com> - 1.1.5-2
- SeaMonkey 1.1.5
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
        https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP redirect
        https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module unloading flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via __proto__ tampering
        https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
        https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in http-index-format parser
        https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in nsFrameManager
        https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla nsXMLHttpRequest::NotifyEventListeners() same-origin violation
        https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses security checks on codebase principals
        https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 13 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default namespace
        https://bugzilla.redhat.com/show_bug.cgi?id=470902
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update seamonkey' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the package-announce mailing list