|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2008-6127 (devhelp)

From:  updates@fedoraproject.org
To:  fedora-package-announce@redhat.com
Subject:  [SECURITY] Fedora 8 Update: devhelp-0.16.1-8.fc8
Date:  Sun, 06 Jul 2008 06:14:11 +0000
Message-ID:  <200807060614.m666EBpx017025@bastion.fedora.phx.redhat.com>

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2008-6127 2008-07-06 04:44:59 -------------------------------------------------------------------------------- Name : devhelp Product : Fedora 8 Version : 0.16.1 Release : 8.fc8 URL : http://developer.imendio.com/projects/devhelp Summary : API document browser Description : An API document browser for GNOME 2. -------------------------------------------------------------------------------- Update Information: Updated firefox packages that fix several security issues are now available for Fedora 8. This update has been rated as having critical security impact by the Fedora Security Response Team. Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed web content was displayed. A web page containing specially-crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808) A flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Updated packages update Mozilla Firefox to upstream version 2.0.0.15 to address these flaws: http://www.mozilla.org/projects/security/known- vulnerabilities.html#firefox2.0.0.15 This update also contains blam, chmsee, devhelp, epiphany, epiphany-extensions, galeon, gnome-python2-extras, gnome-web- photo, gtkmozembedmm, kazehakase, liferea, Miro, openvrml, ruby-gnome2 and yelp packages rebuilt against new Firefox / Gecko libraries. -------------------------------------------------------------------------------- ChangeLog: * Wed Jul 2 2008 Christopher Aillon <caillon@redhat.com> - 0.16.1-8 - Rebuild against newer gecko * Wed Apr 16 2008 Christopher Aillon <caillon@redhat.com> - 0.16.1-7 - Rebuild against newer gecko * Tue Mar 25 2008 Christopher Aillon <caillon@redhat.com> - 0.16.1-6 - Rebuild against newer gecko * Fri Feb 8 2008 Christopher Aillon <caillon@redhat.com> - 0.16.1-5 - Rebuild against newer gecko * Tue Nov 27 2007 Christopher Aillon <caillon@redhat.com> - 0.16.1-4 - Rebuild against newer gecko * Mon Nov 5 2007 Martin Stransky <stransky@redhat.com> - 0.16.1-3.fc8 - rebuild against new firefox -------------------------------------------------------------------------------- References: [ 1 ] Bug #452602 - CVE-2008-2803 Firefox javascript arbitrary code execution https://bugzilla.redhat.com/show_bug.cgi?id=452602 [ 2 ] Bug #452599 - CVE-2008-2800 Firefox XSS attacks https://bugzilla.redhat.com/show_bug.cgi?id=452599 [ 3 ] Bug #452600 - CVE-2008-2802 Firefox arbitrary JavaScript code execution https://bugzilla.redhat.com/show_bug.cgi?id=452600 [ 4 ] Bug #452605 - CVE-2008-2801 Firefox arbitrary signed JAR code execution https://bugzilla.redhat.com/show_bug.cgi?id=452605 [ 5 ] Bug #452604 - CVE-2008-2805 Firefox arbitrary file disclosure https://bugzilla.redhat.com/show_bug.cgi?id=452604 [ 6 ] Bug #452597 - CVE-2008-2798 Firefox malformed web content flaws https://bugzilla.redhat.com/show_bug.cgi?id=452597 [ 7 ] Bug #452598 - CVE-2008-2799 Firefox javascript arbitrary code execution https://bugzilla.redhat.com/show_bug.cgi?id=452598 [ 8 ] Bug #452710 - CVE-2008-2808 Firefox file location escaping flaw https://bugzilla.redhat.com/show_bug.cgi?id=452710 [ 9 ] Bug #452709 - CVE-2008-2807 Firefox .properties memory leak https://bugzilla.redhat.com/show_bug.cgi?id=452709 [ 10 ] Bug #453007 - CVE-2008-2811 Firefox block reflow flaw https://bugzilla.redhat.com/show_bug.cgi?id=453007 [ 11 ] Bug #452712 - CVE-2008-2810 Firefox arbitrary file disclosure https://bugzilla.redhat.com/show_bug.cgi?id=452712 [ 12 ] Bug #452711 - CVE-2008-2809 Firefox self signed certificate flaw https://bugzilla.redhat.com/show_bug.cgi?id=452711 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update devhelp' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at http://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ Fedora-package-announce mailing list Fedora-package-announce@redhat.com http://www.redhat.com/mailman/listinfo/fedora-package-ann...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds