Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=a57756f528782d10aab5464dff07e5a9946d4c99
commit a57756f528782d10aab5464dff07e5a9946d4c99 Author: Miklos Vajna <[email protected]> Date: Mon Mar 9 23:50:40 2009 +0100 FSA583-firefox diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index aa05408..e4106db 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,29 @@ <fsas> <fsa> + <id>583</id> + <date>2009-03-09</date> + <author>Miklos Vajna</author> + <package>firefox</package> + <vulnerable>3.0.6-1solaria1</vulnerable> + <unaffected>3.0.7-1solaria1</unaffected> + <bts>http://bugs.frugalware.org/task/3667</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777</cve> + <desc>Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system. + 1) Multiple errors in the layout and JavaScript engines can be exploited to corrupt memory and potentially execute arbitrary code. + 2) An error in the garbage collection process when handling a set of cloned XUL DOM elements linked as a parent and child can be exploited to access freed memory and execute arbitrary code. + 3) An error can be exploited via the "nsIRDFService" interface and a cross-domain redirect to bypass the same-origin policy and read XML data from another domain. + 4) An error in libpng when handling out-of-memory conditions can be exploited to potentially execute arbitrary code. + 5) An error when handling invisible control characters included in the location bar can be exploited to spoof a trusted URL.</desc> + </fsa> + <fsa> <id>582</id> <date>2009-03-09</date> <author>Miklos Vajna</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
