Fedora Legacy Test Update Notification: mozilla
- Fedora Legacy Test Update Notification FEDORALEGACY-2006-189137-1 Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189137 2006-05-15 - Name: mozilla Versions: rh7.3: mozilla-1.7.13-0.73.1.legacy Versions: rh9: mozilla-1.7.13-0.90.1.legacy Versions: fc1: mozilla-1.7.13-1.1.1.legacy Versions: fc2: mozilla-1.7.13-1.2.1.legacy Versions: fc3: mozilla-1.7.13-1.3.1.legacy Summary : A Web browser. Description : Mozilla is an open-source Web browser, designed for standards compliance, performance, and portability. - Update Information: Updated mozilla packages that fix several security bugs are now available. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Several bugs were found in the way Mozilla processes malformed javascript. A malicious web page could modify the content of a different open web page, possibly stealing sensitive information or conducting a cross-site scripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741) Several bugs were found in the way Mozilla processes certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of chrome, allowing the page to steal sensitive information or install browser malware. (CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742) Several bugs were found in the way Mozilla processes malformed web pages. A carefully crafted malicious web page could cause the execution of arbitrary code as the user running Mozilla. (CVE-2006-0748, CVE-2006-0749, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) A bug was found in the way Mozilla displays the secure site icon. If a browser is configured to display the non-default secure site modal warning dialog, it may be possible to trick a user into believing they are viewing a secure site. (CVE-2006-1740) A bug was found in the way Mozilla allows javascript mutation events on input form elements. A malicious web page could be created in such a way that when a user submits a form, an arbitrary file could be uploaded to the attacker. (CVE-2006-1729) A bug was found in the way Mozilla executes in-line mail forwarding. If a user can be tricked into forwarding a maliciously crafted mail message as in-line content, it is possible for the message to execute javascript with the permissions of chrome. (CVE-2006-0884) Users of Mozilla are advised to upgrade to these updated packages containing Mozilla version 1.7.13 which corrects these issues. - Changelogs rh7.3: * Sat Apr 22 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.13-0.73.1.legacy - Updated to 1.7.13 to fix security issues rh9: * Sat Apr 22 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.13-0.90.1.legacy - Updated to 1.7.13 to fix security issues fc1: * Fri Apr 21 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.13-1.1.1.legacy - Updated to 1.7.13 to fix security issues fc2: * Fri Apr 21 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.13-1.2.1.legacy - Updated to 1.7.13 to fix security issues fc3: * Fri Apr 21 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.13-1.3.1.legacy - Updated to 1.7.13 to fix security issues - This update can be downloaded from: http://download.fedoralegacy.org/ (sha1sums) rh7.3: b7616c52ee2776f3577fcda0a0628c5ec6cffae7 redhat/7.3/updates-testing/i386/mozilla-1.7.13-0.73.1.legacy.i386.rpm a6234bd3b89616ce5b924a36c95ba1421b6b8ecf redhat/7.3/updates-testing/i386/mozilla-chat-1.7.13-0.73.1.legacy.i386.rpm 3d7b92d47b825f5a936c54ca63679916f428917e redhat/7.3/updates-testing/i386/mozilla-devel-1.7.13-0.73.1.legacy.i386.rpm 2b4c765543b3f4fc5ac04127ca70c70a33fddaec redhat/7.3/updates-testing/i386/mozilla-dom-inspector-1.7.13-0.73.1.legacy.i386.rpm c15eceb55105a87f8d5dc0db24b9cf95e815a5a2 redhat/7.3/updates-testing/i386/mozilla-js-debugger-1.7.13-0.73.1.legacy.i386.rpm 09dcdb176779a013efc6b1819e5391854d94a751 redhat/7.3/updates-testing/i386/mozilla-mail-1.7.13-0.73.1.legacy.i386.rpm 5126d56d8ff98dfdcd69ed6864821120fc959c55 redhat/7.3/updates-testing/i386/mozilla-nspr-1.7.13-0.73.1.legacy.i386.rpm d2db357f5fe0d1ffce22db18f7d95c96dcfcffa3 redhat/7.3/updates-testing/i386/mozilla-nspr-devel-1.7.13-0.73.1.legacy.i386.rpm 7b3a403f4981d5ffa676aa38e5699fca9e7c2f18 redhat/7.3/updates-testing/i386/mozilla-nss-1.7.13-0.73.1.legacy.i386.rpm 3eea1812fa6a6ef13ed8826cd7734bd266c9b0fb redhat/7.3/updates-testing/i386/mozilla-nss-devel-1.7.13-0.73.1.legacy.i386.rpm 46393b4afb72fcd8100de2c61b6531d9ffe1dbf5 redhat/7.3/updates-testing/i386/galeon-1.2.14-0.73.6.legacy.i386.rpm
Fedora Legacy Test Update Notification: mozilla
- Fedora Legacy Test Update Notification FEDORALEGACY-2006-180036-1 Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=180036 2006-02-11 - Name: mozilla Versions: rh7.3: mozilla-1.7.12-0.73.3.legacy Versions: rh9: mozilla-1.7.12-0.90.2.legacy Versions: fc1: mozilla-1.7.12-1.1.2.legacy Versions: fc2: mozilla-1.7.12-1.2.3.legacy Versions: fc3: mozilla-1.7.12-1.3.3.legacy Summary : A Web browser. Description : Mozilla is an open-source Web browser, designed for standards compliance, performance, and portability. - Update Information: Updated mozilla packages that fix several security bugs are now available. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Igor Bukanov discovered a bug in the way Mozilla's Javascript interpreter dereferences objects. If a user visits a malicious web page, Mozilla could crash or execute arbitrary code as the user running Mozilla. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0292 to this issue. moz_bug_r_a4 discovered a bug in Mozilla's XULDocument.persist() function. A malicious web page could inject arbitrary RDF data into a user's localstore.rdf file, which can cause Mozilla to execute arbitrary javascript when a user runs Mozilla. (CVE-2006-0296) A denial of service bug was found in the way Mozilla saves history information. If a user visits a web page with a very long title, it is possible Mozilla will crash or take a very long time the next time it is run. (CVE-2005-4134) Users of Mozilla are advised to upgrade to these updated packages, which contain backported patches to correct these issues. - Changelogs rh7.3: * Sun Feb 05 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-0.73.3.legacy - Fix CVE-2005-4134, CVE-2006-0292, CVE-2006-0296 rh9: * Mon Feb 06 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-0.90.2.legacy - Fix CVE-2005-4134, CVE-2006-0292, CVE-2006-0296 fc1: * Sun Feb 05 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-1.1.2.legacy - Fix CVE-2005-4134, CVE-2006-0292, CVE-2006-0296 fc2: * Fri Feb 10 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-1.2.3.legacy - Added mozilla-nspr to BuildPrereq * Sun Feb 05 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-1.2.2.legacy - Fix CVE-2005-4134, CVE-2006-0292, CVE-2006-0296 fc3: * Fri Feb 10 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-1.3.3.legacy - Added mozilla-nspr, gnome-vfs2-devel, desktop-file-utils, and krb5-devel to BuildPrereq * Sun Feb 05 2006 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.12-1.3.2.legacy - Fix CVE-2005-4134, CVE-2006-0292, CVE-2006-0296 - This update can be downloaded from: http://download.fedoralegacy.org/ (sha1sums) rh7.3: baf937574b92b01271c70169e5e6465eb7736c81 redhat/7.3/updates-testing/i386/mozilla-1.7.12-0.73.3.legacy.i386.rpm 4e401f2064201c290aa00527d148141904532d8a redhat/7.3/updates-testing/i386/mozilla-chat-1.7.12-0.73.3.legacy.i386.rpm d97acf0463781ac5600754b02b5a902125df5fd4 redhat/7.3/updates-testing/i386/mozilla-devel-1.7.12-0.73.3.legacy.i386.rpm 251eb4a2d0e0f8cf63b7b7975c9819a7e58fd5b3 redhat/7.3/updates-testing/i386/mozilla-dom-inspector-1.7.12-0.73.3.legacy.i386.rpm 584062b1c063fb8c2375693b49e48b8ae7530a00 redhat/7.3/updates-testing/i386/mozilla-js-debugger-1.7.12-0.73.3.legacy.i386.rpm aa3594680a3224f6b8b7abb9a6b9585fa6f519c1 redhat/7.3/updates-testing/i386/mozilla-mail-1.7.12-0.73.3.legacy.i386.rpm 1676c32cd8143b9ff939b45269b2423b50d062f1 redhat/7.3/updates-testing/i386/mozilla-nspr-1.7.12-0.73.3.legacy.i386.rpm 9d9d350082b38b94d45e458e02f3345b0a4e3ed0 redhat/7.3/updates-testing/i386/mozilla-nspr-devel-1.7.12-0.73.3.legacy.i386.rpm 33753a720edea798966550963426db05a409a6c4 redhat/7.3/updates-testing/i386/mozilla-nss-1.7.12-0.73.3.legacy.i386.rpm b17dec4e9eab3acca07dc0345d01fa522c3f43d8 redhat/7.3/updates-testing/i386/mozilla-nss-devel-1.7.12-0.73.3.legacy.i386.rpm 169c96bd3eae5e8f4220ed87291ceb176bf1f6b2 redhat/7.3/updates-testing/SRPMS/mozilla-1.7.12-0.73.3.legacy.src.rpm rh9: ffa6d9ff83d69b2aa32fb92a660775cbb92f2b53 redhat/9/updates-testing/i386/mozilla-1.7.12-0.90.2.legacy.i386.rpm d4bc650d1652ae30bb4df3037bcd1f9f77781774 redhat/9/updates-testing/i386/mozilla-chat-1.7.12-0.90.2.legacy.i386.rpm 0148688359ca6168c0c77160c8891315ac319147 redhat/9/updates-testing/i386/mozilla-devel-1.7.12-0.90.2.legacy.i386.rpm 2be970089280e3b23401402e5ea5019cc57b95ba redhat/9/updates-testing/i386/mozilla-dom-inspector-1.7.12-0.90.2.legacy.i386.rpm 653ceef20cbbd2d415ab8453b5c6d6e81193b6b3 redhat/9/updates-testing/i386/mozilla-js-debugger-1.7.12-0.90.2.legacy.i386.rpm
Fedora Legacy Test Update Notification: mozilla
- Fedora Legacy Test Update Notification FEDORALEGACY-2005-160202 Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 2005-08-12 - Name: mozilla Versions: rh7.3: mozilla-1.7.10-0.73.1.legacy Versions: rh9: mozilla-1.7.10-0.90.1.legacy Versions: fc1: mozilla-1.7.10-1.1.1.legacy Versions: fc2: mozilla-1.7.10-1.2.1.legacy Summary : A Web browser. Description : Mozilla is an open-source Web browser, designed for standards compliance, performance, and portability. - Update Information: Updated mozilla packages that fix various security issues are now available. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A bug was found in the way Mozilla handled synthetic events. It is possible that Web content could generate events such as keystrokes or mouse clicks that could be used to steal data or execute malicious Javascript code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-2260 to this issue. A bug was found in the way Mozilla executed Javascript in XBL controls. It is possible for a malicious webpage to leverage this vulnerability to execute other JavaScript based attacks even when JavaScript is disabled. (CAN-2005-2261) A bug was found in the way Mozilla installed its extensions. If a user can be tricked into visiting a malicious webpage, it may be possible to obtain sensitive information such as cookies or passwords. (CAN-2005-2263) A bug was found in the way Mozilla handled certain Javascript functions. It is possible for a malicious webpage to crash the browser by executing malformed Javascript code. (CAN-2005-2265) A bug was found in the way Mozilla handled multiple frame domains. It is possible for a frame as part of a malicious website to inject content into a frame that belongs to another domain. This issue was previously fixed as CAN-2004-0718 but was accidentally disabled. (CAN-2005-1937) A bug was found in the way Mozilla handled child frames. It is possible for a malicious framed page to steal sensitive information from its parent page. (CAN-2005-2266) A bug was found in the way Mozilla opened URLs from media players. If a media player opens a URL which is Javascript, the Javascript executes with access to the currently open webpage. (CAN-2005-2267) A design flaw was found in the way Mozilla displayed alerts and prompts. Alerts and prompts were given the generic title [JavaScript Application] which prevented a user from knowing which site created them. (CAN-2005-2268) A bug was found in the way Mozilla handled DOM node names. It is possible for a malicious site to overwrite a DOM node name, allowing certain privileged chrome actions to execute the malicious Javascript. (CAN-2005-2269) A bug was found in the way Mozilla cloned base objects. It is possible for Web content to traverse the prototype chain to gain access to privileged chrome objects. (CAN-2005-2270) Users of Mozilla are advised to upgrade to these updated packages, which contain Mozilla version 1.7.10 and are not vulnerable to these issues. - Changelogs rh7.3: * Wed Jul 27 2005 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.10-0.73.1.legacy - Rebuild as a Fedora Legacy update for Red Hat Linux 7.3 - Added missing freetype-devel BuildRequires - Fix missing icons in desktop files rh9: * Thu Jul 28 2005 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.10-0.90.1.legacy - Rebuilt as a Fedora Legacy update for Red Hat Linux 9 - Disabled desktop-file-utils - Disabled gtk2 - Added missing BuildRequires - Force build with gcc296 to remain compatible with plugins - Added xft font preferences and patch back in - Removed mozilla-compose.desktop fc1: * Thu Jul 28 2005 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.10-1.1.1.legacy - Rebuilt as Fedora Legacy update for Fedora Core 1 - Changed useragent vendor tag to Fedora - Removed Network category from mozilla.desktop - Added missing gnome-vfs2-devel and desktop-file-utils to BuildRequires fc2: * Sat Jul 30 2005 Marc Deslauriers [EMAIL PROTECTED] 37:1.7.10-1.2.1.legacy - Rebuilt as a Fedora Legacy update to Fedora Core 2 - Reverted to desktop-file-utils 0.4 - Removed desktop-update-database - Disabled pango support - Added missing gnome-vfs2-devel, desktop-file-utils and krb5-devel BuildPrereq - This update can be downloaded from: http://download.fedoralegacy.org/ (sha1sums) rh7.3: 21ef0fc3fb4a4b1bab035a3ca39f05793980f96c redhat/7.3/updates-testing/i386/mozilla-1.7.10-0.73.1.legacy.i386.rpm bd577e6f2da710d29e4b80178c06824dc49f777e redhat/7.3/updates-testing/i386/mozilla-chat-1.7.10-0.73.1.legacy.i386.rpm