[FC1] UNSUPPORTED UPDATES by James

2005-08-12 Thread James Kosin

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Again,

- 
-

JAMES' Unofficial Unsupported by RedHat, Redhat Fedora Core, and
Redhat Fedora Legacy Groups!
~Any support for my packages, will only come from me! There is no
~bugzilla for the packages, groups may not know what version you are
~talking about. The biggest support can come from ME or the source
~creators of the program. Although, any patches kept over from the
~Fedora Core packages are not supported by the vendor of the software.
~My packages are usually re-packaged new versions of many programs.
- 
-


ClamAV 0.86.2-3
- -

This is only a fixed version of the package.  I've tightened the
permissions on the /var/run/clamav directory to 700.  This fixes the
clamav-milter program from complaining at some point about the socket
being insecure at some point.

I've also submitted a patch to the development team at clamav.net
The code for clamav-milter looks like it should support signing a
message with the (default) signature; but, turns out the signature in
the code is just a placeholder and you need to specify the
- --singature-file parameter for signing to work.
My patch is not in this version.

I've also loosened the version for FC1 on the ZLib libraries to the
latest released version from Fedora Legacy Group.  I have not tested
this

RPM
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/clamav-0.86.2-3.fc1.i386.rpm
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/clamav-milter-0.86.2-3.fc1.i386.rpm
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/clamav-devel-0.86.2-3.fc1.i386.rpm

SOURCE
http://support.intcomgrp.com/mirror/fedora-core/beta/src/clamav-0.86.2-3.fc1.src.rpm

- 
-
- 
-


Kernel 2.4.30-2.3   (VANILLA)
- --

I've also built a new version of the kernel.
This version is based on the latest patches to kernel version 2.3.32-pre3.

Please keep all your old kernels, this is not an OFFICIAL RELEASE and
your mileage will vary.

RPM
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/kernel-2.4.30-2.3.fc1.vanilla.i686.rpm
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/kernel-smp-2.4.30-2.3.fc1.vanilla.i686.rpm
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/kernel-doc-2.4.30-2.3.fc1.vanilla.i386.rpm
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/kernel-source-2.4.30-2.3.fc1.vanilla.i386.rpm

SOURCE
http://support.intcomgrp.com/mirror/fedora-core/beta/src/kernel-2.4.30-2.3.fc1.vanilla.src.rpm

- 
-
- 
-


Samba-Vscan-ClamAv   0.4.0-0
- --

This is a snapshot version of version 0.4.0 for samba-vscan!
He has made improvements and removed support for samba 2.x.  So, this
version is for samba 3.x and greater now.
I have been running it for more than a week now without problems.

RPM
http://support.intcomgrp.com/mirror/fedora-core/beta/i386/samba-vscan-clamav-0.4.0-0.fc1.i386.rpm

SOURCE
http://support.intcomgrp.com/mirror/fedora-core/beta/src/samba-vscan-clamav-0.4.0-0.fc1.src.rpm

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFC/Me4kNLDmnu1kSkRAq7pAJ4wldZodG5yGR+ubMcXhi1i1BP9HgCdFTOx
SsyXpOijoNiJXJY6hS1xhyY=
=tXi6
-END PGP SIGNATURE-

--
fedora-legacy-list mailing list
fedora-legacy-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-legacy-list


Fedora Legacy Test Update Notification: mozilla

2005-08-12 Thread Marc Deslauriers
-
Fedora Legacy Test Update Notification
FEDORALEGACY-2005-160202
Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
2005-08-12
-

Name: mozilla
Versions: rh7.3: mozilla-1.7.10-0.73.1.legacy
Versions: rh9: mozilla-1.7.10-0.90.1.legacy
Versions: fc1: mozilla-1.7.10-1.1.1.legacy
Versions: fc2: mozilla-1.7.10-1.2.1.legacy
Summary : A Web browser.
Description :
Mozilla is an open-source Web browser, designed for standards
compliance, performance, and portability.

-
Update Information:

Updated mozilla packages that fix various security issues are now
available.

Mozilla is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

A bug was found in the way Mozilla handled synthetic events. It is
possible that Web content could generate events such as keystrokes or
mouse clicks that could be used to steal data or execute malicious
Javascript code. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2260 to this issue.

A bug was found in the way Mozilla executed Javascript in XBL controls.
It is possible for a malicious webpage to leverage this vulnerability to
execute other JavaScript based attacks even when JavaScript is disabled.
(CAN-2005-2261)

A bug was found in the way Mozilla installed its extensions. If a user
can be tricked into visiting a malicious webpage, it may be possible to
obtain sensitive information such as cookies or passwords.
(CAN-2005-2263)

A bug was found in the way Mozilla handled certain Javascript functions.
It is possible for a malicious webpage to crash the browser by executing
malformed Javascript code. (CAN-2005-2265)

A bug was found in the way Mozilla handled multiple frame domains. It is
possible for a frame as part of a malicious website to inject content
into a frame that belongs to another domain. This issue was previously
fixed as CAN-2004-0718 but was accidentally disabled. (CAN-2005-1937)

A bug was found in the way Mozilla handled child frames. It is possible
for a malicious framed page to steal sensitive information from its
parent page. (CAN-2005-2266)

A bug was found in the way Mozilla opened URLs from media players. If a
media player opens a URL which is Javascript, the Javascript executes
with access to the currently open webpage. (CAN-2005-2267)

A design flaw was found in the way Mozilla displayed alerts and prompts.
Alerts and prompts were given the generic title [JavaScript Application]
which prevented a user from knowing which site created them.
(CAN-2005-2268)

A bug was found in the way Mozilla handled DOM node names. It is
possible for a malicious site to overwrite a DOM node name, allowing
certain privileged chrome actions to execute the malicious Javascript.
(CAN-2005-2269)

A bug was found in the way Mozilla cloned base objects. It is possible
for Web content to traverse the prototype chain to gain access to
privileged chrome objects. (CAN-2005-2270)

Users of Mozilla are advised to upgrade to these updated packages, which
contain Mozilla version 1.7.10 and are not vulnerable to these issues.

-
Changelogs

rh7.3:
* Wed Jul 27 2005 Marc Deslauriers [EMAIL PROTECTED]
37:1.7.10-0.73.1.legacy
- Rebuild as a Fedora Legacy update for Red Hat Linux 7.3
- Added missing freetype-devel BuildRequires
- Fix missing icons in desktop files

rh9:
* Thu Jul 28 2005 Marc Deslauriers [EMAIL PROTECTED]
37:1.7.10-0.90.1.legacy
- Rebuilt as a Fedora Legacy update for Red Hat Linux 9
- Disabled desktop-file-utils
- Disabled gtk2
- Added missing BuildRequires
- Force build with gcc296 to remain compatible with plugins
- Added xft font preferences and patch back in
- Removed mozilla-compose.desktop

fc1:
* Thu Jul 28 2005 Marc Deslauriers [EMAIL PROTECTED]
37:1.7.10-1.1.1.legacy
- Rebuilt as Fedora Legacy update for Fedora Core 1
- Changed useragent vendor tag to Fedora
- Removed Network category from mozilla.desktop
- Added missing gnome-vfs2-devel and desktop-file-utils to BuildRequires

fc2:
* Sat Jul 30 2005 Marc Deslauriers [EMAIL PROTECTED]
37:1.7.10-1.2.1.legacy
- Rebuilt as a Fedora Legacy update to Fedora Core 2
- Reverted to desktop-file-utils 0.4
- Removed desktop-update-database
- Disabled pango support
- Added missing gnome-vfs2-devel, desktop-file-utils and krb5-devel
BuildPrereq

-
This update can be downloaded from:
  http://download.fedoralegacy.org/
(sha1sums)

rh7.3:
21ef0fc3fb4a4b1bab035a3ca39f05793980f96c
redhat/7.3/updates-testing/i386/mozilla-1.7.10-0.73.1.legacy.i386.rpm
bd577e6f2da710d29e4b80178c06824dc49f777e
redhat/7.3/updates-testing/i386/mozilla-chat-1.7.10-0.73.1.legacy.i386.rpm