|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0324 (webkit)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0324: webkit-1.8.3-1.mga2 (2/core)
Date:  Tue, 6 Nov 2012 20:33:27 +0100
Message-ID:  <20121106193327.GA21803@valstar.mageia.org>

MGASA-2012-0324 Date: November 6th, 2012 Affected releases: 2 Description: Updated webkit packages fix security vulnerabilities: A large number of security issues were discovered in the WebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution (CVE-2011-3031, CVE-2011-3038, CVE-2011-3042, CVE-2011-3043, CVE-2011-3044, CVE-2011-3051, CVE-2011-3053, CVE-2011-3059, CVE-2011-3060, CVE-2011-3064, CVE-2011-3067, CVE-2011-3076, CVE-2011-3081, CVE-2011-3086, CVE-2011-3090, CVE-2012-1521, CVE-2012-3598, CVE-2012-3601, CVE-2012-3604, CVE-2012-3611, CVE-2012-3612, CVE-2012-3617, CVE-2012-3625, CVE-2012-3626, CVE-2012-3627, CVE-2012-3628, CVE-2012-3645, CVE-2012-3652, CVE-2012-3657, CVE-2012-3669, CVE-2012-3670, CVE-2012-3671, CVE-2012-3672, CVE-2012-3674). Updated Packages: lib(64)javascriptcoregtk1.0_0-1.8.3-1.mga2 lib(64)javascriptcoregtk3.0_0-1.8.3-1.mga2 lib(64)jscore-gir1.0-1.8.3-1.mga2 lib(64)jscore-gir3.0-1.8.3-1.mga2 lib(64)webkit-gir1.0-1.8.3-1.mga2 lib(64)webkit-gir3.0-1.8.3-1.mga2 lib(64)webkitgtk1.0_0-1.8.3-1.mga2 lib(64)webkitgtk1.0-devel-1.8.3-1.mga2 lib(64)webkitgtk3.0_0-1.8.3-1.mga2 lib(64)webkitgtk3.0-devel-1.8.3-1.mga2 webkit1.0-1.8.3-1.mga2 webkit1.0-webinspector-1.8.3-1.mga2 webkit-1.8.3-1.mga2 webkit3.0-1.8.3-1.mga2 webkit3.0-webinspector-1.8.3-1.mga2 webkit3-1.8.3-1.mga2 webkit3-gtklauncher-1.8.3-1.mga2 webkit3-jsc-1.8.3-1.mga2 webkit-debug-1.8.3-1.mga2 webkit-gtklauncher-1.8.3-1.mga2 webkit-jsc-1.8.3-1.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3031 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3038 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3042 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3043 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3051 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3059 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3060 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3064 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3067 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3090 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1521 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3601 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3604 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3611 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3612 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3617 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3645 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3652 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3669 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3670 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3671 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3672 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3674 http://www.ubuntu.com/usn/usn-1617-1/ https://bugs.mageia.org/show_bug.cgi?id=7908 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds