Fedora 9 Update: pyke-0.5-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9640
2008-11-14 11:07:45


Name: pyke
Product : Fedora 9
Version : 0.5
Release : 1.fc9
URL : http://pyke.sourceforge.net/
Summary : Knowledge-based inference engine
Description :
Pyke is a knowledge-based inference engine (expert system) written in 100%
python that can:
* Do both forward-chaining (data driven) and backward-chaining (goal
  directed) inferencing.
* Automatically generate python programs by assembling individual python
  functions into complete call graphs.


Update Information:

Update to 0.5, API changes in an incompatible way, but nothing depends on pyke
in Fedora. See:
http://sourceforge.net/project/shownotes.php?group_id=207724release_id=639302

ChangeLog:



This update can be installed with the yum update program.  Use 
su -c 'yum update pyke' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: flashrom-0-0.14.20081103svn3723.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9353
2008-11-14 11:07:52


Name: flashrom
Product : Fedora 9
Version : 0
Release : 0.14.20081103svn3723.fc9
URL : http://linuxbios.org/Flashrom
Summary : Simple program for reading/writing BIOS chips content
Description :
Utility which can be used to detect BIOS chips (DIP, PLCC), read their contents
and write new contents on the chips (flash the chip).


Update Information:

%changelog  * Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED]
0-0.14.20081103svn3723  - Dump ICH8/ICH9/ICH10 SPI registers  - Add additional
SPI sector erase and chip erase command  - Add support for the ST M50FW002 chip
- Support for some Numonyx parts (M25PE)  - SPI boot flash support on EP80579  -
Support for the Intel 82371MX (MPIIX) southbridge  - Support for the Intel
82371FB PIIX and 82371SB (PIIX3) southbridges  - Support for the VIA VT82C586A/B
chipset  - ICH10 support to flashrom  - Support for AM29F002(N)B[BT]

ChangeLog:

* Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.14.20081103svn3723
- Dump ICH8/ICH9/ICH10 SPI registers
- Add additional SPI sector erase and chip erase command
- Add support for the ST M50FW002 chip
- Support for some Numonyx parts (M25PE)
- SPI boot flash support on EP80579
- Support for the Intel 82371MX (MPIIX) southbridge
- Support for the Intel 82371FB PIIX and 82371SB (PIIX3) southbridges
- Support for the VIA VT82C586A/B chipset
- ICH10 support to flashrom
- Support for AM29F002(N)B[BT]
* Mon Oct  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.13.20080928svn3602
- More ExcludeArch
* Sun Sep 28 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.12.20080928svn3602
- Proper support for EN29F002(A)(N)[BT]
- Recognize the Intel EP80579 LPC flash interface
- Add support for MSI KT4V
- Support for Winbond W39V040C and MSI K8T Neo2-F
* Sun Jul  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.11.20080607svn3418
- AMIC A29002
- flashing system with Nvidia MCP67
- PCI IDs for EPIA-CN
- VIA SPI controller on VT8237S
- ICH7 SPI support
- support for AMIC Technology A49LF040A
- Board enable and autodetection for GIGABYTE GA-7VT600
- Add support for Amic Technology A29040B flash chip
- Board enable and autodetection for BioStar P4M80-M4
- Add support for the ASUS P4B266 board
- Add support for Amic A25L40P SPI flash
* Fri Jun  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.10.20080517svn3332
- Exclude sparc64
* Sat May 17 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.9.20080517svn3332
- Fixed %patch0
* Sat May 17 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.8.20080517svn3332
- Support Pm49FL004/2 Block Locking Registers
- Add support for the Atmel AT25DF321 SPI flash
- Lots of new SST flash chip IDs
- Add lots of ATMEL SPI flash chips
- Add SST39VF512, SST39VF010, SST39VF040 support
- Add ICH9 detection to flashrom
- Support for the Winbond W39V080FA series of chips
- Support for flashing on the Kontron 986LCD-M board
- Add board_enable for Artec Group DBE61 and DBE62


This update can be installed with the yum update program.  Use 
su -c 'yum update flashrom' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: qtoctave-0.8.1-0.20080823.svn165.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-7407
2008-11-14 11:08:03


Name: qtoctave
Product : Fedora 9
Version : 0.8.1
Release : 0.20080823.svn165.fc9
URL : http://qtoctave.wordpress.com/
Summary : Frontend for Octave
Description :
QtOctave is a frontend for Octave based on Qt4.


Update Information:

qtoctave is a fronted for octave written using qt4 widgets. It includes a
m-editor, a pane for showing variables, a file navigator pane, a command-history
pane, lots of helpers to easily create graphics, solve equations, analyze
functions.

ChangeLog:


References:

  [ 1 ] Bug #438750 - Review Request: qtoctave - fronted for octave written 
using qt4 widgets
https://bugzilla.redhat.com/show_bug.cgi?id=438750


This update can be installed with the yum update program.  Use 
su -c 'yum update qtoctave' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: gerbv-2.1.0-2.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9643
2008-11-14 11:08:13


Name: gerbv
Product : Fedora 8
Version : 2.1.0
Release : 2.fc8
URL : http://gerbv.sourceforge.net/
Summary : Gerber file viewer from the gEDA toolkit
Description :
Gerber Viewer (gerbv) is a viewer for Gerber files. Gerber files
are generated from PCB CAD system and sent to PCB manufacturers
as basis for the manufacturing process. The standard supported
by gerbv is RS-274X.

gerbv also supports drill files. The format supported are known
under names as NC-drill or Excellon. The format is a bit undefined
and different EDA-vendors implement it different.

gerbv is listed among Fedora Electronic Lab (FEL) packages.


Update Information:

new stable release

ChangeLog:

* Thu Nov 13 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
2.1.0-2
- BR ImageMagick-devel added
* Thu Nov 13 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
2.1.0-1
- New upstream release and split into -devel package
* Fri Feb  1 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
2.0.0-1
- New upstream release
* Tue Dec  4 2007 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
1.0.3-1
- new upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update gerbv' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


[SECURITY] Fedora 9 Update: clamav-0.93.3-2.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9644
2008-11-14 11:08:19


Name: clamav
Product : Fedora 9
Version : 0.93.3
Release : 2.fc9
URL : http://www.clamav.net
Summary : End-user tools for the Clam Antivirus scanner
Description :
Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
software is the integration with mail servers (attachment scanning). The
package provides a flexible and scalable multi-threaded daemon, a command
line scanner, and a tool for automatic updating via Internet. The programs
are based on a shared library distributed with the Clam AntiVirus package,
which you can use with your own software. The virus database is based on
the virus database from OpenAntiVirus, but contains additional signatures
(including signatures for popular polymorphic viruses, too) and is KEPT UP
TO DATE.


Update Information:

Security fixes from upstream 0.94 and 0.94.1:CVE-2008-1389 (#461461):
Invalid memory access in the CHM unpacker  CVE-2008-3912 (#461461): Multiple
out-of-memory NULL pointer dereferences  CVE-2008-3913 (#461461): Fix memory
leak in the error code path in freshclam  CVE-2008-3914 (#461461): Multiple file
descriptor leaks on the error code path  CVE-2008-5050 (#470783):
get_unicode_name() off-by-one buffer overflow

ChangeLog:

* Thu Nov 13 2008 Tomas Hoger [EMAIL PROTECTED] - 0.93.3-2
- Security update - backport security fixes from 0.94:
  CVE-2008-1389 (#461461): Invalid memory access in the CHM unpacker
  CVE-2008-3912 (#461461): Multiple out-of-memory NULL pointer dereferences
  CVE-2008-3913 (#461461): Fix memory leak in the error code path in freshclam
  CVE-2008-3914 (#461461): Multiple file descriptor leaks on the error code path
- Security update - backport security fixes from 0.94.1:
  CVE-2008-5050 (#470783): get_unicode_name() off-by-one buffer overflow
* Sun Jul 13 2008 Enrico Scholz [EMAIL PROTECTED] - 0.93.3-1
- updated to 0.93.3; improved fix for CVE-2008-2713 (out-of-bounds read
  on petite files) - CVE-2008-3215
- put pid instead of pgrp into pidfile of clamav-milter (bz #452359)
* Tue Jun 17 2008 Enrico Scholz [EMAIL PROTECTED] - 0.93.1-1
- updated to 0.93.1
- rediffed -path patch
- CVE-2008-2713 Invalid Memory Access Denial Of Service Vulnerability
* Mon Apr 14 2008 Enrico Scholz [EMAIL PROTECTED] - 0.93-1
- updated to final 0.93
- removed daily.inc + main.inc directories; they are now replaced by
  *.cld containers
- trimmed down MAILTO list of cronjob to 'root' again; every well
  configured system has an alias for this recipient

References:

  [ 1 ] Bug #461461 - clamav: multiple security fixes in 0.94 (CVE-2008-1389, 
CVE-2008-3912, CVE-2008-3913, CVE-2008-3914)
https://bugzilla.redhat.com/show_bug.cgi?id=461461
  [ 2 ] Bug #470783 - CVE-2008-5050 clamav: get_unicode_name() off-by-one 
buffer overflow  ( 0.94.1)
https://bugzilla.redhat.com/show_bug.cgi?id=470783


This update can be installed with the yum update program.  Use 
su -c 'yum update clamav' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: flashrom-0-0.14.20081103svn3723.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9399
2008-11-14 11:08:26


Name: flashrom
Product : Fedora 8
Version : 0
Release : 0.14.20081103svn3723.fc8
URL : http://linuxbios.org/Flashrom
Summary : Simple program for reading/writing BIOS chips content
Description :
Utility which can be used to detect BIOS chips (DIP, PLCC), read their contents
and write new contents on the chips (flash the chip).


Update Information:

%changelog  * Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED]
0-0.14.20081103svn3723  - Dump ICH8/ICH9/ICH10 SPI registers  - Add additional
SPI sector erase and chip erase command  - Add support for the ST M50FW002 chip
- Support for some Numonyx parts (M25PE)  - SPI boot flash support on EP80579  -
Support for the Intel 82371MX (MPIIX) southbridge  - Support for the Intel
82371FB PIIX and 82371SB (PIIX3) southbridges  - Support for the VIA VT82C586A/B
chipset  - ICH10 support to flashrom  - Support for AM29F002(N)B[BT]

ChangeLog:

* Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.14.20081103svn3723
- Dump ICH8/ICH9/ICH10 SPI registers
- Add additional SPI sector erase and chip erase command
- Add support for the ST M50FW002 chip
- Support for some Numonyx parts (M25PE)
- SPI boot flash support on EP80579
- Support for the Intel 82371MX (MPIIX) southbridge
- Support for the Intel 82371FB PIIX and 82371SB (PIIX3) southbridges
- Support for the VIA VT82C586A/B chipset
- ICH10 support to flashrom
- Support for AM29F002(N)B[BT]
* Mon Oct  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.13.20080928svn3602
- More ExcludeArch
* Sun Sep 28 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.12.20080928svn3602
- Proper support for EN29F002(A)(N)[BT]
- Recognize the Intel EP80579 LPC flash interface
- Add support for MSI KT4V
- Support for Winbond W39V040C and MSI K8T Neo2-F
* Sun Jul  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.11.20080607svn3418
- AMIC A29002
- flashing system with Nvidia MCP67
- PCI IDs for EPIA-CN
- VIA SPI controller on VT8237S
- ICH7 SPI support
- support for AMIC Technology A49LF040A
- Board enable and autodetection for GIGABYTE GA-7VT600
- Add support for Amic Technology A29040B flash chip
- Board enable and autodetection for BioStar P4M80-M4
- Add support for the ASUS P4B266 board
- Add support for Amic A25L40P SPI flash
* Fri Jun  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.10.20080517svn3332
- Exclude sparc64
* Sat May 17 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.9.20080517svn3332
- Fixed %patch0
* Sat May 17 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.8.20080517svn3332
- Support Pm49FL004/2 Block Locking Registers
- Add support for the Atmel AT25DF321 SPI flash
- Lots of new SST flash chip IDs
- Add lots of ATMEL SPI flash chips
- Add SST39VF512, SST39VF010, SST39VF040 support
- Add ICH9 detection to flashrom
- Support for the Winbond W39V080FA series of chips
- Support for flashing on the Kontron 986LCD-M board
- Add board_enable for Artec Group DBE61 and DBE62
* Sat Feb  9 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.7.20080209svn3099
- Add board enable for VIA EPIA SP
- support for devices using AMD Geode companion chip CS5536 that have the
  Boot ROM on NOR flash that is directly connected to FLASH_CS3 (Boot
  Flash Chip Select)
- Add support for the PMC Pm25LV family of SPI flash chips
- Add ids and chip entry for Spansion S25FL016A
- Support for MX25L3205D chip
- Enable MX25L8005 support
* Wed Jan  9 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.6.20080109svn3036
- support for SST25VF040B flash chip
- enable ga_2761gxdk board
- support for EN29F002(A)(N)B chips
- support for EON EN29F002AT flash chip
- support for 25VF016B flash chip
- support for ST M25P05-A, M25P10-A, M25P20, M25P40, M25P16, M25P32,
  M25P64 and M25P128 flash chips
- support for ST M25P80 flash chip
- support for AT49F002, AT49F002N, AT49F002T and AT49F002NT flash chips
- enable Acorp 6A815EPD board
* Sun Nov 18 2007 Peter Lemenkov [EMAIL PROTECTED] 0-0.5.20071118svn2967
- svn ver. 2967 (support for Intel 440MX systems, Fujitsu MBM29F400TC,
  AMD Geode CS5536)
* Sun Oct 28 2007 Peter Lemenkov [EMAIL PROTECTED] 0-0.4.20071028svn2897
- typo fix
* Sun Oct 28 2007 Peter Lemenkov [EMAIL PROTECTED] 0-0.3.20071028svn2897
- svn ver. 2897 (support for Gigabyte M61P-S3 SPI m/b, Am29LV040B chip)
- flashrom executable now sits in sbindir since it's administrator's tool


This update can be installed with the yum update program.  Use 
su -c 'yum update flashrom' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages 

Fedora 9 Update: xorg-x11-server-1.5.2-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9380
2008-11-14 11:08:26


Name: xorg-x11-server
Product : Fedora 9
Version : 1.5.2
Release : 3.fc9
URL : http://www.x.org
Summary : X.Org X11 X server
Description :
X.Org X11 X server


Update Information:

Set AllowEmptyInput to off by default to force driver kbd to load if the
server is started without a configuration file.   xkb: fix core keyboard map
generation.According to Section 12.4 of the XKB Protocol Spec, if a key only
has a single group but the keyboard has multiple groups defined, the core
description of the key is a duplication of the single group across all symbols.
i.e. G1L1 G1L2 G1L1 G1L2 G1L3 G1L4 G1L3 G1L4 The previous code generated G1L1
G1L2 G1L3 G1L4 G1L3 G1L4, leading to invented groups when the process is
reversed.

ChangeLog:

* Mon Nov  3 2008 Peter Hutterer [EMAIL PROTECTED] 1.5.2-3
- xserver-1.5.0-no-evdev-keyboards-kthnx.patch: disable AllowEmptyInput by
  default again (got inadvertently removed). (#462606)
* Mon Oct 27 2008 Peter Hutterer [EMAIL PROTECTED] 1.5.2-2
- xserver-1.5.0-more-sanity-checks.patch: more sanity checks to stop vmmouse
  from segfaulting the server. #434807
* Mon Oct 13 2008 Adam Jackson [EMAIL PROTECTED] 1.5.2-1
- xserver 1.5.2
- xserver-1.5.1-global-backtrace.patch: Make backtracing globally available.
- xserver-1.5.2-mieq-backtrace.patch: bt when the input queue overflows.
* Fri Sep 12 2008 Adam Jackson [EMAIL PROTECTED] 1.5.0-1
- xserver 1.5.0
* Wed Jul 23 2008 Adam Jackson [EMAIL PROTECTED] 1.4.99.906-1
- 1.5RC6.
* Wed Jul  2 2008 Adam Jackson [EMAIL PROTECTED] 1.4.99.905-2.20080702
- Today's snapshot.
* Mon Jun 30 2008 Adam Jackson [EMAIL PROTECTED] 1.4.99.905-1.20080701
- 1.5RC5.
* Thu Jun 12 2008 Dave Airlie [EMAIL PROTECTED] 1.4.99.902-3.20080612
- xserver-1.5.0-fix-single-aspect.patch - fix 2560x1600 on my monitor.
* Thu Jun 12 2008 Dave Airlie [EMAIL PROTECTED] 1.4.99.902-2.20080612
- cve-2008-1377: Record and Security Extension Input validation
- cve-2008-1379: MIT-SHM extension Input Validation flaw
- cve-2008-2360: Render AllocateGlyph extension Integer overflows
- cve-2008-2361: Render CreateCursor extension Integer overflows
- cve-2008-2362: Render Gradient extension Integer overflows
- Rebase to 1.5 head for security patches for above
* Mon Jun  9 2008 Adam Jackson [EMAIL PROTECTED] 1.4.99.902-1.20080609
- Today's git snapshot.

References:

  [ 1 ] Bug #462606 - No keyboard in xorg-x11-server-Xorg-1.5.0-1.fc9.x86_64
https://bugzilla.redhat.com/show_bug.cgi?id=462606
  [ 2 ] Bug #434807 - vmmouse cursor position doesn't match screen coordinates
https://bugzilla.redhat.com/show_bug.cgi?id=434807
  [ 3 ] Bug #458747 - Wrong display size detectedon Samsung 2493HM LCD
https://bugzilla.redhat.com/show_bug.cgi?id=458747
  [ 4 ] Bug #460545 - None
https://bugzilla.redhat.com/show_bug.cgi?id=460545


This update can be installed with the yum update program.  Use 
su -c 'yum update xorg-x11-server' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: kde-plasma-quickaccess-0.7.1-2.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9500
2008-11-14 11:08:26


Name: kde-plasma-quickaccess
Product : Fedora 9
Version : 0.7.1
Release : 2.fc9
URL : http://www.kde-look.org/content/show.php/QuickAccess?content=84128
Summary : Plasma applet for quick access to the most used folders
Description :
QuickAccess is a small applet designed for the panel to have quick access
to the most used folders.


Update Information:

Set default size of applet.


This update can be installed with the yum update program.  Use 
su -c 'yum update kde-plasma-quickaccess' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: monafont-2.90-4.fc8.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9645
2008-11-14 11:08:26


Name: monafont
Product : Fedora 8
Version : 2.90
Release : 4.fc8.1
URL : http://monafont.sourceforge.net/
Summary : Japanese font for text arts
Description :
Mona Font is a Japanese proportional font which allows you to view
Japanese text arts correctly.


Update Information:

monafont is rebuilt against VLGothic 20081029.


This update can be installed with the yum update program.  Use 
su -c 'yum update monafont' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: superiotool-0-0.14.20081103svn3698.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9358
2008-11-14 11:08:34


Name: superiotool
Product : Fedora 9
Version : 0
Release : 0.14.20081103svn3698.fc9
URL : http://linuxbios.org/index.php/Superiotool
Summary : Simple program for detecting Super I/O on your mainboard
Description :
User-space helper tool which allows you to detect which Super I/O you have
on your mainboard, and it can provide detailed information about the register
contents of the Super I/O.


Update Information:

%changelog  * Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED]
0-0.14.20081103svn3698  - Support for the ITE IT8661F/IT8770F, IT8673F, and
IT8671F/IT8687R  - Add register definitions for W83627HF  - Drop global register
0x07 for all Super I/Os  - Add dump support to ITE IT8726F  - Add Fintek
F71882FG support  - Add some more Super I/O IDs/names

ChangeLog:

* Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.14.20081103svn3698
- Support for the ITE IT8661F/IT8770F, IT8673F, and IT8671F/IT8687R
- Add register definitions for W83627HF
- Drop global register 0x07 for all Super I/Os
- Add dump support to ITE IT8726F
- Add Fintek F71882FG support
- Add some more Super I/O IDs/names
* Mon Oct  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.13.20080815svn3511
- More ExcludeArch
* Fri Aug 15 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.12.20080815svn3511
- Fixed svn path (LinuxBIOS renamed to Coreboot)
- svn ver. 3511
- add support for SMSC SIO10N268 (trivial)
- add support for 2 new SMSC superio chips
- Add dump support for Winbond (NSC) PC87427
* Sun May 18 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.11.20080518svn3319
- Fixed installation
* Sun May 18 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.10.20080518svn3319
- Add support for dumping ITE IT8718F EC registers
- Detect SMSC SCH5027
- Small cleanups


This update can be installed with the yum update program.  Use 
su -c 'yum update superiotool' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: ganyremote-5.4.1-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9647
2008-11-14 11:08:44


Name: ganyremote
Product : Fedora 9
Version : 5.4.1
Release : 1.fc9
URL : http://anyremote.sourceforge.net/
Summary : GTK frontend for anyRemote
Description :
gAnyRemote package is GTK GUI frontend for anyRemote
(http://anyremote.sourceforge.net/). The overall goal of this project is to
provide remote control service on Linux through Bluetooth, InfraRed, Wi-Fi
or TCP/IP connection.


ChangeLog:



This update can be installed with the yum update program.  Use 
su -c 'yum update ganyremote' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: pysvn-1.6.2-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9378
2008-11-14 11:08:51


Name: pysvn
Product : Fedora 8
Version : 1.6.2
Release : 1.fc8
URL : http://pysvn.tigris.org/
Summary : Pythonic style bindings for Subversion
Description :
Pythonic style bindings for Subversion



This update can be installed with the yum update program.  Use 
su -c 'yum update pysvn' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-utils-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9648
2008-11-14 11:08:51


Name: geda-utils
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org/tools/utils/index.html
Summary : Several utilities for the gEDA project
Description :
Several utilities for the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Mon Jul  7 2008 Tom spot Callaway [EMAIL PROTECTED] - 20080127-2
- fix conditional comparison
* Fri Feb  1 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-utils' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-gattrib-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9648
2008-11-14 11:08:51


Name: geda-gattrib
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org/tools/gattrib/index.html
Summary : Attribute editor for gEDA
Description :
Gattrib is gEDA's attribute editor. It reads a set of gschem .sch files
(schematic files), and creates a spreadsheet showing all components in
rows, with the associated component attributes listed in the columns.
It allows the user to add, modify, or delete component attributes outside
of gschem, and then save the .sch files back out. When it is completed,
it will allow the user to edit attributes attached to components, nets,
and pins. (Currently, only component attribute editing is implemented;
pin attributes are displayed only, and net attributes are TBD.)


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Sun Feb  3 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-2
- fix desktop file
- added gettext-devel and intltool as BR
* Sat Feb  2 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gattrib' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-gsymcheck-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9648
2008-11-14 11:08:51


Name: geda-gsymcheck
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org/tools/gsymcheck/index.html
Summary : Symbol checker for electronics schematics editor
Description :
Gsymcheck is a utility to check symbols for gschem.
It is part of the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Sat Feb  2 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gsymcheck' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-gnetlist-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9648
2008-11-14 11:08:51


Name: geda-gnetlist
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org/tools/gnetlist/index.html
Summary : Netlister for the gEDA project
Description :
Gnetlist generates netlists from schematics drawn with gschem
(the gEDA schematic editor). Possible output formats are:
- native
- tango
- spice
- allegro
- PCB
- verilog
and others.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Sat Feb  2 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gnetlist' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-gschem-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9648
2008-11-14 11:08:51


Name: geda-gschem
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org/tools/gschem/index.html
Summary : Electronics schematics editor
Description :
Gschem is an electronics schematic editor. It is part of the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Sun Feb  3 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-2
- fix desktop file
- added gettext-devel and intltool as BR
* Fri Feb  1 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gschem' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: bouncycastle-1.41-2.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9649
2008-11-14 11:08:58


Name: bouncycastle
Product : Fedora 9
Version : 1.41
Release : 2.fc9
URL : http://www.bouncycastle.org/
Summary : Bouncy Castle Crypto Package for Java
Description :
The Bouncy Castle JCE provider.


Update Information:

bouncycastle-mail is new for F-9. It has been in the rawhide (and then in F-10)
for a while.  bouncycastle's spec is updated for guidelines compatibility

ChangeLog:

* Tue Nov 11 2008 Orcan Ogetbil orcanbahri [AT] yahoo [DOT] com 1.41-2
- Fixed license tag (BSD - MIT).
- Minor improvements in the SPEC file for better compatibility with the 
  Fedora Java Packaging Guidelines.
- Added Provides: bcprov == %{version}-%{release}.
* Thu Oct  2 2008 Lillian Angel [EMAIL PROTECTED] - 1.41-1
- Import Bouncy Castle 1.41.
- Resolves: rhbz#465203
* Thu May 15 2008 Thomas Fitzsimmons [EMAIL PROTECTED] - 1.39-1
- Import Bouncy Castle 1.39.
- Set target to 1.5.

References:

  [ 1 ] Bug #465382 - Review Request: bouncycastle-mail - SMIME/CMS packages 
for Bouncy Castle
https://bugzilla.redhat.com/show_bug.cgi?id=465382


This update can be installed with the yum update program.  Use 
su -c 'yum update bouncycastle' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: bouncycastle-mail-1.41-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9649
2008-11-14 11:08:58


Name: bouncycastle-mail
Product : Fedora 9
Version : 1.41
Release : 3.fc9
URL : http://www.bouncycastle.org/
Summary : S/MIME and CMS libraries for Bouncy Castle
Description :
Bouncy Castle consists of a lightweight cryptography API and is
a provider for the Java Cryptography Extension and the Java
Cryptography Architecture. This library package offers additional
classes, in particuar generators/processors for S/MIME and CMS,
for Bouncy Castle.


Update Information:

bouncycastle-mail is new for F-9. It has been in the rawhide (and then in F-10)
for a while.  bouncycastle's spec is updated for guidelines compatibility

References:

  [ 1 ] Bug #465382 - Review Request: bouncycastle-mail - SMIME/CMS packages 
for Bouncy Castle
https://bugzilla.redhat.com/show_bug.cgi?id=465382


This update can be installed with the yum update program.  Use 
su -c 'yum update bouncycastle-mail' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: tennix-0.6.1-4.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-8326
2008-11-14 11:09:26


Name: tennix
Product : Fedora 8
Version : 0.6.1
Release : 4.fc8
URL : http://icculus.org/tennix/
Summary : A simple tennis game
Description :
Tennix! is a SDL port of a simple tennis game.
It features a two-player game mode and a single-player mode
against the computer.


Update Information:

Tennix! is a SDL port of a simple tennis game.  It features a two-player game
mode and a single-player mode  against the computer.

References:

  [ 1 ] Bug #445604 - Review Request: tennix - A funny 2D tennis game
https://bugzilla.redhat.com/show_bug.cgi?id=445604


This update can be installed with the yum update program.  Use 
su -c 'yum update tennix' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


[SECURITY] Fedora 8 Update: clamav-0.92.1-4.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9651
2008-11-14 11:09:18


Name: clamav
Product : Fedora 8
Version : 0.92.1
Release : 4.fc8
URL : http://www.clamav.net
Summary : End-user tools for the Clam Antivirus scanner
Description :
Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
software is the integration with mail servers (attachment scanning). The
package provides a flexible and scalable multi-threaded daemon, a command
line scanner, and a tool for automatic updating via Internet. The programs
are based on a shared library distributed with the Clam AntiVirus package,
which you can use with your own software. The virus database is based on
the virus database from OpenAntiVirus, but contains additional signatures
(including signatures for popular polymorphic viruses, too) and is KEPT UP
TO DATE.


Update Information:

Security fixes from upstream 0.94 and 0.94.1:CVE-2008-3912 (#461461):
Multiple out-of-memory NULL pointer dereferences  CVE-2008-3913 (#461461): Fix
memory leak in the error code path in freshclam  CVE-2008-3914 (#461461): File
descriptor leak on the error code path  CVE-2008-5050 (#470783):
get_unicode_name() off-by-one buffer overflow

ChangeLog:

* Thu Nov 13 2008 Tomas Hoger [EMAIL PROTECTED] - 0.92.1-4
- Security update - backport security fixes from 0.94:
  CVE-2008-3912 (#461461): Multiple out-of-memory NULL pointer dereferences
  CVE-2008-3913 (#461461): Fix memory leak in the error code path in freshclam
  CVE-2008-3914 (#461461): File descriptor leak on the error code path
- Security update - backport security fixes from 0.94.1:
  CVE-2008-5050 (#470783): get_unicode_name() off-by-one buffer overflow
* Sun Jul 13 2008 Enrico Scholz [EMAIL PROTECTED] - 0.92.1-3
- disabled check which prevents older freshclam versions to run in 4h
  intervals (bz #453601)
- backported security fixes from 0.93.3:
  CVE-2008-2713: out-of-bounds read on petite files
* Thu Apr 24 2008 Tomas Hoger [EMAIL PROTECTED] - 0.92.1-2
- Security update - backport security fixes from 0.93:
  CVE-2008-1100 (#442360): Upack Processing Buffer Overflow Vulnerability
  CVE-2008-1387 (#442525): Endless loop / hang with crafted arj
  CVE-2008-0314 (#442740): PeSpin Heap Overflow Vulnerability
  CVE-2008-1833 (#442741): PE WWPack Heap Overflow Vulnerability
* Mon Feb 11 2008 Enrico Scholz [EMAIL PROTECTED] - 0.92.1-1
- updated to 0.92.1
* Tue Jan  1 2008 Enrico Scholz [EMAIL PROTECTED] - 0.92-6
- redisabled unrar stuff completely by using clean sources
* Tue Jan  1 2008 Enrico Scholz [EMAIL PROTECTED] - 0.92-5
- use a better way to disable RPATH-generation (needed for '--with
  unrar' builds)
* Mon Dec 31 2007 Enrico Scholz [EMAIL PROTECTED] - 0.92-4
- added a README.fedora to the milter package (#240610)
- ship original sources again; unrar is now licensed correctly (no more
  stolen code put under GPL). Nevertheless, this license is not GPL
  compatible, and to allow libclamav to be used by GPL applications,
  unrar is disabled by a ./configure switch.
- use pkg-config in clamav-config to emulate --cflags and --libs
  operations (fixes partly multilib issues)
- registered some more auto-updated files and marked them as %ghost
* Fri Dec 21 2007 Tom spot Callaway [EMAIL PROTECTED] - 0.92-3
- updated to 0.92 (SECURITY):
- CVE-2007-6335 MEW PE File Integer Overflow Vulnerability

References:

  [ 1 ] Bug #461461 - clamav: multiple security fixes in 0.94 (CVE-2008-1389, 
CVE-2008-3912, CVE-2008-3913, CVE-2008-3914)
https://bugzilla.redhat.com/show_bug.cgi?id=461461
  [ 2 ] Bug #470783 - CVE-2008-5050 clamav: get_unicode_name() off-by-one 
buffer overflow  ( 0.94.1)
https://bugzilla.redhat.com/show_bug.cgi?id=470783


This update can be installed with the yum update program.  Use 
su -c 'yum update clamav' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: monafont-2.90-4.fc9.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9652
2008-11-14 11:09:26


Name: monafont
Product : Fedora 9
Version : 2.90
Release : 4.fc9.1
URL : http://monafont.sourceforge.net/
Summary : Japanese font for text arts
Description :
Mona Font is a Japanese proportional font which allows you to view
Japanese text arts correctly.


Update Information:

monafont is rebuilt against VLGothic 20081029.

ChangeLog:



This update can be installed with the yum update program.  Use 
su -c 'yum update monafont' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: projectM-pulseaudio-1.2.0-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9653
2008-11-14 11:09:33


Name: projectM-pulseaudio
Product : Fedora 9
Version : 1.2.0
Release : 3.fc9
URL : http://projectm.sourceforge.net/
Summary : The projectM visualization plugin for pulseaudio
Description :
This package allows the use of the projectM visualization plugin through any
pulseaudio compatible applications.


Update Information:

Initial build

References:

  [ 1 ] Bug #464054 - Package Review Request for projectM-pulseaudio
https://bugzilla.redhat.com/show_bug.cgi?id=464054


This update can be installed with the yum update program.  Use 
su -c 'yum update projectM-pulseaudio' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: ssm-0.1-9.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9654
2008-11-14 11:09:41


Name: ssm
Product : Fedora 9
Version : 0.1
Release : 9.fc9
URL : http://www.bioxray.au.dk/~mok/ssm
Summary : Macromolecular coordinate superposition library
Description :
SSM is a macromolecular coordinate superposition library, written by
Eugene Krissinel.

The library implements the SSM algorithm of protein structure
comparison in three dimensions, which includes an original procedure
of matching graphs built on the protein's secondary-structure
elements, followed by an iterative three-dimensional alignment of
protein backbone Calpha atoms.

The algorithm implemented by the software is described in:
E. Krissinel  K. Henrick (2004) Secondary-structure matching (SSM), a
new tool for fast protein structure alignment in three dimensions.
Acta Crystallogr D Biol Crystallogr. 60, 2256-68.

This package contains the shared library components needed for programs
that have been compiled with the ssm library.



This update can be installed with the yum update program.  Use 
su -c 'yum update ssm' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: R-bigmemory-2.3-3.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9655
2008-11-14 11:09:50


Name: R-bigmemory
Product : Fedora 8
Version : 2.3
Release : 3.fc8
URL : http://cran.r-project.org/web/packages/bigmemory/index.html
Summary : Manage massive matrices in R using C++, with support for shared 
memory
Description :
Use C++ to create, store, access, and manipulate massive matrices. Under
*NIX, it also supports use of shared memory.


Update Information:

New package:   Use C++ to create, store, access, and manipulate massive
matrices. Under *NIX, it also supports use of shared memory.

References:

  [ 1 ] Bug #454441 - Review Request: R-bigmemory - Manage massive matrices in 
R using C++, with support for shared memory
https://bugzilla.redhat.com/show_bug.cgi?id=454441


This update can be installed with the yum update program.  Use 
su -c 'yum update R-bigmemory' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: fuse-encfs-1.5-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9266
2008-11-14 11:10:08


Name: fuse-encfs
Product : Fedora 8
Version : 1.5
Release : 1.fc8
URL : http://arg0.net/wiki/encfs
Summary : Encrypted pass-thru filesystem in userspace
Description :
EncFS implements an encrypted filesystem in userspace using FUSE.  FUSE
provides a Linux kernel module which allows virtual filesystems to be written
in userspace.  EncFS encrypts all data and filenames in the filesystem and
passes access through to the underlying filesystem.  Similar to CFS except that
it does not use NFS.


Update Information:

Ver. 1.5

ChangeLog:

* Sun Oct 26 2008 Peter Lemenkov [EMAIL PROTECTED] 1.5-1
- Ver. 1.5
- Dropped upstreamed patches
* Tue Aug 12 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.2-5
- Rebuild with new boost
* Fri Aug  1 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.2-4
- Fix build with new rlog
* Sat Jul 12 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.2-3
- rebuild due to rlog soname bump
* Mon May  5 2008 Tomas Hoger [EMAIL PROTECTED] - 1.4.2-2
- Work-around broken boost library path auto detection causing build failures
  on 64-bit architectures.
* Mon Apr 14 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.2-1
- Ver. 1.4.2
- add option to pass-through file 'holes'.  Only available in expert mode
- config file format changed to XML via boost serialization
(config file is now .encfs6.xml)
- remove ulockmgr support, caused numerous locking issues. (bz# 440483)
- fix symlink handling in encfsctl export
- fix stdinpass option parsing, reported by Scott Hendrickson
- fix path suffix in encfsctl
* Fri Mar 28 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.4.1.1-5
- Update patch for building with GCC 4.3 (use cstring throughout)
* Tue Mar 25 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.1.1-4.1
- Another attempt to fix GCC 4.3 builds
* Tue Mar 25 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.1.1-4
- Another attempt to fix GCC 4.3 builds
* Tue Feb 19 2008 Fedora Release Engineering [EMAIL PROTECTED] - 1.4.1.1-3
- Autorebuild for GCC 4.3
* Sat Feb  9 2008 Peter Lemenkov [EMAIL PROTECTED] 1.4.1.1-2
- Rebuild for GCC 4.3


This update can be installed with the yum update program.  Use 
su -c 'yum update fuse-encfs' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


[SECURITY] Fedora 9 Update: quassel-0.3.0.3-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9658
2008-11-14 11:10:21


Name: quassel
Product : Fedora 9
Version : 0.3.0.3
Release : 1.fc9
URL : http://quassel-irc.org/
Summary : QT4 Based distrubuted IRC system
Description :
Quassel IRC is a modern, distributed IRC client,
meaning that one (or multiple) client(s) can attach
to and detach from a central core --
much like the popular combination of screen and a
text-based IRC client such as WeeChat, but graphical


Update Information:

New upstream release fixes a security issue with CTCP handling in   Quassel
Core, that could potentially be exploited to send arbitrary IRC commands on
your behalf.


This update can be installed with the yum update program.  Use 
su -c 'yum update quassel' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: pysvn-1.6.2-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9371
2008-11-14 11:10:28


Name: pysvn
Product : Fedora 9
Version : 1.6.2
Release : 1.fc9
URL : http://pysvn.tigris.org/
Summary : Pythonic style bindings for Subversion
Description :
Pythonic style bindings for Subversion


Update Information:



ChangeLog:



This update can be installed with the yum update program.  Use 
su -c 'yum update pysvn' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: grc-0.70-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-7344
2008-11-14 11:10:28


Name: grc
Product : Fedora 9
Version : 0.70
Release : 3.fc9
URL : http://gnuradio.org/trac/wiki/GNURadioCompanion
Summary : GUI for Gnuradio
Description :
The GNU Radio Companion is a preliminary graphical user interface
which allows GNU Radio components to be put together graphically.
It is currently under development by Josh Blum. GNU Radio Companion
encompasses over 200 blocks from the GNU Radio Project.


Update Information:

The GNU Radio Companion is a preliminary graphical user interface  which allows
GNU Radio components to be put together graphically.  It is currently under
development by Josh Blum. GNU Radio Companion  encompasses over 200 blocks from
the GNU Radio Project.

References:

  [ 1 ] Bug #460104 - GRC not installed
https://bugzilla.redhat.com/show_bug.cgi?id=460104


This update can be installed with the yum update program.  Use 
su -c 'yum update grc' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: basket-1.0.3.1-2.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9659
2008-11-14 11:10:28


Name: basket
Product : Fedora 9
Version : 1.0.3.1
Release : 2.fc9
URL : http://basket.kde.org/
Summary : Taking care of your ideas
Description :
A multi-purpose note-taking application that makes it easy to write down ideas
as you think, and quickly find them later.  You can collect, import or share
any data, tag your notes and secure it some or all of it with passwords and/or
encryption.


Update Information:

Taking care of your ideas

ChangeLog:

* Mon Nov 10 2008 Christopher D. Stover [EMAIL PROTECTED] 1.0.3.1-2
- added a requires for hicolor-icon-theme
- removed -p from the main package /sbin/ldconfig
* Sat Oct 25 2008 Christopher D. Stover [EMAIL PROTECTED] 1.0.3.1-1
- version 1.0.3.1
- gcc43 patch is no longer needed
* Sat Jun  7 2008 Kevin Kofler [EMAIL PROTECTED] 1.0.2-7
- disable -kontact for F10+ (can't integrate KDE 3 app into KDE 4 Kontact)
* Sun Jun  1 2008 Aurelien Bompard [EMAIL PROTECTED] 1.0.2-6
- rebuild

References:

  [ 1 ] Bug #468562 - Review Request: basket - Taking care of your ideas
https://bugzilla.redhat.com/show_bug.cgi?id=468562


This update can be installed with the yum update program.  Use 
su -c 'yum update basket' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: wraplinux-1.6-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9660
2008-11-14 11:10:38


Name: wraplinux
Product : Fedora 9
Version : 1.6
Release : 1.fc9
URL : http://www.kernel.org/pub/linux/utils/boot/wraplinux/
Summary : Utility to wrap a Linux kernel and initrd into an ELF or NBI file
Description :
A tool to wrap an x86 Linux kernel and one or more initrd files into a
single file in ELF or NBI format, as required by some booting protocols.


Update Information:

Requirement of LTSP.


This update can be installed with the yum update program.  Use 
su -c 'yum update wraplinux' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-examples-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9663
2008-11-14 11:11:04


Name: geda-examples
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org
Summary : Circuit examples for gEDA
Description :
This package contains circuit examples for the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Mon Jul  7 2008 Tom spot Callaway [EMAIL PROTECTED] - 20080127-2
- fix conditional comparison
* Sat Feb  2 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-examples' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: libgeda-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9662
2008-11-14 11:10:55


Name: libgeda
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org
Summary : Libraries for the gEDA project
Description :
This package contains libgeda, the library needed by gEDA applications.


Update Information:

new upstream release

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
- cleaned rpmlint warnings : unused-direct-shlib-dependencies
* Fri Feb  1 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
- disable-update-mime-database
- prepare post and postun
- treat locales properly
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update libgeda' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-symbols-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9663
2008-11-14 11:11:04


Name: geda-symbols
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org
Summary : Electronic symbols for gEDA
Description :
This package contains a bunch of symbols of electronic devices
used by gschem, the gEDA project schematic editor.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Fri Feb  1 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release
- added transfig as BR for fig2dev


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-symbols' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: geda-docs-20080929-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9663
2008-11-14 11:11:04


Name: geda-docs
Product : Fedora 8
Version : 20080929
Release : 1.fc8
URL : http://www.geda.seul.org
Summary : Documentation for gEDA
Description :
This package contains documentation for the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Sat Feb  2 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080127-1
- New upstream release
* Tue Jan 22 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20071231-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-docs' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: R-bigmemory-2.3-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9664
2008-11-14 11:11:12


Name: R-bigmemory
Product : Fedora 9
Version : 2.3
Release : 3.fc9
URL : http://cran.r-project.org/web/packages/bigmemory/index.html
Summary : Manage massive matrices in R using C++, with support for shared 
memory
Description :
Use C++ to create, store, access, and manipulate massive matrices. Under
*NIX, it also supports use of shared memory.


Update Information:

New package:   Use C++ to create, store, access, and manipulate massive
matrices. Under *NIX, it also supports use of shared memory.

ChangeLog:


References:

  [ 1 ] Bug #454441 - Review Request: R-bigmemory - Manage massive matrices in 
R using C++, with support for shared memory
https://bugzilla.redhat.com/show_bug.cgi?id=454441


This update can be installed with the yum update program.  Use 
su -c 'yum update R-bigmemory' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: barry-0.14-4.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9665
2008-11-14 11:11:19


Name: barry
Product : Fedora 8
Version : 0.14
Release : 4.fc8
URL : http://www.netdirect.ca/downloads/barry
Summary : BlackBerry Desktop for Linux
Description :
Barry is a desktop toolset for managing your BlackBerry device.

This package contains commandline tools which will enable you to charge your
device with a proper 500mA and be able to access data on the device.  It also
includes a GUI application to backup your BlackBerry.


Update Information:

Barry is a desktop toolset for managing your BlackBerry device.

References:

  [ 1 ] Bug #467958 - Review Request: barry - BlackBerry(tm) Desktop for Linux
https://bugzilla.redhat.com/show_bug.cgi?id=467958


This update can be installed with the yum update program.  Use 
su -c 'yum update barry' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: barry-0.14-4.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9666
2008-11-14 11:11:26


Name: barry
Product : Fedora 9
Version : 0.14
Release : 4.fc9
URL : http://www.netdirect.ca/downloads/barry
Summary : BlackBerry Desktop for Linux
Description :
Barry is a desktop toolset for managing your BlackBerry device.

This package contains commandline tools which will enable you to charge your
device with a proper 500mA and be able to access data on the device.  It also
includes a GUI application to backup your BlackBerry.


Update Information:

Barry is a desktop toolset for managing your BlackBerry device.

ChangeLog:


References:

  [ 1 ] Bug #467958 - Review Request: barry - BlackBerry(tm) Desktop for Linux
https://bugzilla.redhat.com/show_bug.cgi?id=467958


This update can be installed with the yum update program.  Use 
su -c 'yum update barry' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


[SECURITY] Fedora 8 Update: firefox-2.0.0.18-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: firefox
Product : Fedora 8
Version : 2.0.0.18
Release : 1.fc8
URL : http://www.mozilla.org/projects/firefox/
Summary : Mozilla Firefox Web browser.
Description :
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.18-1
- Update to 2.0.0.18
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.17-1
- Update to 2.0.0.17
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.16-1
- Update to 2.0.0.16
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.15-1
- Update to 2.0.0.15
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.14-1
- Update to 2.0.0.14
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.13-1
- Update to 2.0.0.13
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] 2.0.0.12-1
- Update to 2.0.0.12
* Thu Dec 13 2007 Christopher Aillon [EMAIL PROTECTED] 2.0.0.10-3
- Fix the getStartPage method to not return blank.
  Patch by [EMAIL PROTECTED]
* Wed Nov 28 2007 Christopher Aillon [EMAIL PROTECTED] 2.0.0.10-2
- Make Canvas.drawImage work again
* Mon Nov 26 2007 Christopher Aillon [EMAIL PROTECTED] 2.0.0.10-1
- Update to 2.0.0.10
* Mon Nov  5 2007 Martin Stransky [EMAIL PROTECTED] 2.0.0.9-1
- updated to the latest upstream
* Wed Oct 31 2007 Martin Stransky [EMAIL PROTECTED] 2.0.0.8-3
- added mozilla-plugin-config to startup script

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 

[SECURITY] Fedora 8 Update: epiphany-2.20.3-8.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: epiphany
Product : Fedora 8
Version : 2.20.3
Release : 8.fc8
URL : http://www.gnome.org/projects/epiphany/
Summary : GNOME web browser based on the Mozilla rendering engine
Description :
epiphany is a simple GNOME web browser based on the Mozilla rendering
engine.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-8
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-7
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-6
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-5
- Rebuild against newer gecko
* Sun Apr 27 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-4
- Stop shipping LowContrastLargePrint icons
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-3
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-2
- Rebuild against newer gecko
* Sat Mar  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.3-1
- Update to 2.20.3
* Sat Mar  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.2-4
- Update the useragent for Fedora
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.2-3
- Rebuild against newer gecko
* Thu Nov 29 2007 Martin Stransky [EMAIL PROTECTED] - 2.20.2-2
- Polished wrapper patch
* Tue Nov 27 2007 Matthias Clasen [EMAIL PROTECTED] - 2.20.2-1
- Update to 2.20.2
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-6
- Rebuild against newer gecko
* Mon Nov 19 2007 Martin Stransky [EMAIL PROTECTED] - 2.20.1-5
- Updated wrapper patch
* Mon Nov  5 2007 Martin Stransky [EMAIL PROTECTED] - 2.20.1-4
- Rebuild against new firefox

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore

[SECURITY] Fedora 8 Update: cairo-dock-1.6.3.1-1.fc8.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: cairo-dock
Product : Fedora 8
Version : 1.6.3.1
Release : 1.fc8.1
URL : http://www.cairo-dock.org/
Summary : Light eye-candy fully themable animated dock
Description :
An light eye-candy fully themable animated dock for any
Linux desktop. It has a family-likeness with OSX dock,
but with more options.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 13 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update cairo-dock' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list

[SECURITY] Fedora 8 Update: epiphany-extensions-2.20.1-11.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: epiphany-extensions
Product : Fedora 8
Version : 2.20.1
Release : 11.fc8
URL : http://www.gnome.org/projects/epiphany/extensions
Summary : Extensions for Epiphany, the GNOME web browser
Description :
Epiphany Extensions is a collection of extensions for Epiphany, the
GNOME web browser.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-11
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-10
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-9
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-8
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-7
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-6
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-5
- Rebuild against newer gecko
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 2.20.1-3
- Rebuild against newer gecko
* Tue Nov  6 2007 Peter Gordon [EMAIL PROTECTED] - 2.20.1-2
- Rebuild for new Gecko (Firefox 2.0.0.9)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - 

[SECURITY] Fedora 8 Update: blam-1.8.3-19.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: blam
Product : Fedora 8
Version : 1.8.3
Release : 19.fc8
URL : http://www.cmartin.tk/blam.html
Summary : An RSS/RDF feed reader
Description :
Blam is a tool that helps you keep track of the growing
number of news feeds distributed as RSS. Blam lets you
subscribe to any number of feeds and provides an easy to
use and clean interface to stay up to date


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-19
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-18
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-17
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-16
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-15
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-14
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-13
- Rebuild against newer gecko
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 1.8.3-12
- Rebuild against newer gecko
* Thu Nov 22 2007 Peter Gordon [EMAIL PROTECTED] - 1.8.3-11
- Fix CVE-2005-4790 (bug 252294).
* Tue Nov 13 2007 Peter Gordon [EMAIL PROTECTED] - 1.8.3-10
- Rebuild for new Gecko (Firefox 2.0.0.9).

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 

[SECURITY] Fedora 8 Update: chmsee-1.0.0-5.31.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: chmsee
Product : Fedora 8
Version : 1.0.0
Release : 5.31.fc8
URL : http://chmsee.gro.clinux.org/
Summary : A Gtk+2 CHM document viewer
Description :
A gtk2 chm document viewer.

It uses chmlib to extract files. It uses gecko to display pages. It supports
displaying multilingual pages due to gecko. It features bookmarks and tabs.
The tabs could be used to jump inside the chm file conveniently. Its UI is
clean and handy, also is well localized. It is actively developed and
maintained. The author of chmsee is Jungle Ji and several other great people.

Hint
* Unlike other chm viewers, chmsee extracts files from chm file, and then read
and display them. The extracted files could be found in $HOME/.chmsee/bookshelf
directory. You can clean those files at any time and there is a special config
option for that.
* The bookmark is related to each file so not all bookmarks will be loaded,
only current file's.
* Try to remove $HOME/.chmsee if you encounter any problem after an upgrade.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-5.31
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-4.31
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-3.31
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-2.31
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-2.30
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-1.30
- Rebuild against newer gecko
* Tue Mar  4 2008 bbbush [EMAIL PROTECTED] - 1.0.0-1.29
- re-add firefox_version
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.0-1.28
- Rebuild against newer gecko

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - 

[SECURITY] Fedora 8 Update: devhelp-0.16.1-11.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: devhelp
Product : Fedora 8
Version : 0.16.1
Release : 11.fc8
URL : http://developer.imendio.com/projects/devhelp
Summary : API document browser
Description :
An API document browser for GNOME 2.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-11
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-10
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-9
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-8
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-7
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-6
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-5
- Rebuild against newer gecko
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 0.16.1-4
- Rebuild against newer gecko
* Mon Nov  5 2007 Martin Stransky [EMAIL PROTECTED] - 0.16.1-3.fc8
- rebuild against new firefox

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals

[SECURITY] Fedora 8 Update: evolution-rss-0.0.8-13.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: evolution-rss
Product : Fedora 8
Version : 0.0.8
Release : 13.fc8
URL : http://gnome.eu.org/evo/index.php/Evolution_RSS_Reader_Plugin
Summary : Evolution RSS Reader
Description :
This is an evolution plugin which enables evolution to read rss feeds.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.0.8-13
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 0.0.8-12
- Rebuild against newer gecko
* Wed Jul 16 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-11
- Rebuild against newer gecko (1.8.1.18)
* Mon Jul  7 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-10
- Rebuild against newer gecko (1.8.1.15)
* Mon Apr 28 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-9
- Rebuild against newer gecko (1.8.1.14)
* Thu Apr 10 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-8
- Make gecko primary render engine
- Force gecko-libs as required deps
* Fri Mar 28 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-7
- Rebuild against newer gecko

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 13 ] Bug #470902 - CVE-2008-5024 Mozilla parsing 

[SECURITY] Fedora 8 Update: galeon-2.0.4-6.fc8.3

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: galeon
Product : Fedora 8
Version : 2.0.4
Release : 6.fc8.3
URL : http://galeon.sourceforge.net/
Summary : GNOME2 Web browser based on Mozilla
Description :
Galeon is a web browser built around Gecko (Mozilla's rendering
engine) and Necko (Mozilla's networking engine). It's a GNOME web
browser, designed to take advantage of as many GNOME technologies as
makes sense. Galeon was written to do just one thing - browse the web.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-6.3
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-5.3
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-4.3
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-3.3
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-2.3
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-1.3
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.4-1.2
- Rebuild against newer gecko
* Sun Jan  6 2008 Denis Leroy [EMAIL PROTECTED] - 2.0.4-1.1
- Fixed plugin-wrapper patch
* Sat Dec 15 2007 Denis Leroy [EMAIL PROTECTED] - 2.0.4-1
- Update to upstream 2.0.4
- Some patches integrated upstream, plugin-wrapper patch ported
* Thu Nov 29 2007 Martin Stransky [EMAIL PROTECTED] - 2.0.3-17
- Updated patch for wrapped plugins
* Tue Nov 27 2007 Denis Leroy [EMAIL PROTECTED] - 2.0.3-16
- Rebuild with gecko lib 1.8.1.10
* Mon Nov 19 2007 Martin Stransky [EMAIL PROTECTED] - 2.0.3-15
- Added support for wrapped plugins
* Tue Nov  6 2007 Denis Leroy [EMAIL PROTECTED] - 2.0.3-14
- Rebuild with gecko lib 1.8.1.9

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session 

[SECURITY] Fedora 8 Update: gnome-web-photo-0.3-14.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: gnome-web-photo
Product : Fedora 8
Version : 0.3
Release : 14.fc8
URL : http://ftp.gnome.org/pub/GNOME/sources/gnome-web-photo/0.3/
Summary : HTML pages thumbnailer
Description :
gnome-web-photo contains a thumbnailer that will be used by GNOME applications,
including the file manager, to generate screenshots of web pages.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-14
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-13
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-12
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-11
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-10
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-9
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-8
- Rebuild against newer gecko
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 0.3-7
- Rebuild against newer gecko
* Tue Nov  6 2007 - Martin Stransky [EMAIL PROTECTED] - 0.3-6
- Rebuild for new Gecko
* Thu Oct 25 2007 - Bastien Nocera [EMAIL PROTECTED] - 0.3-5
- Rebuild for new Gecko, tighten dependencies

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() 

[SECURITY] Fedora 8 Update: liferea-1.4.15-5.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: liferea
Product : Fedora 8
Version : 1.4.15
Release : 5.fc8
URL : http://liferea.sourceforge.net/
Summary : An RSS/RDF feed reader
Description :
Liferea (Linux Feed Reader) is an RSS/RDF feed reader.
It's intended to be a clone of the Windows-only FeedReader.
It can be used to maintain a list of subscribed feeds,
browse through their items, and show their contents.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.15-5
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.15-4
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.15-3
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.15-2
- Rebuild against newer gecko
* Thu May 15 2008 Marc Wiriadisastra [EMAIL PROTECTED] - 1.4.15-1
- New version rebuild for F-8 and F-7
* Mon Apr  7 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.4.13-2
- Rebuild for N-E-V-R issues.
* Mon Mar 17 2008 Marc Wiriadisastra [EMAIL PROTECTED] - 1.4.13-1
- Updated to latest stable version
* Sat Feb 23 2008 Marc Wiriadisastra [EMAIL PROTECTED] - 1.4.12-2
- Fixed fedora feed for fedora weekly news
* Wed Feb 20 2008 Marc Wiriadisastra [EMAIL PROTECTED] - 1.4.12-1
- new version
- builds with gcc4.3
- added firefox-devel and xulrunner-devel for different fedora's
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.11-2
- Rebuild against newer gecko
* Thu Jan 17 2008 Brian Pepple [EMAIL PROTECTED] - 1.4.11-1
- Update to 1.4.11. release fixes news bin crasher. (#429021)
* Wed Dec 19 2007 Brian Pepple [EMAIL PROTECTED] - 1.4.10-1
- Update to 1.4.10.
- Update feed patch.
* Sun Dec  2 2007 Brian Pepple [EMAIL PROTECTED] - 1.4.9-1
- Update to 1.4.9.
- Update feed patch.
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 1.4.8-2
- Rebuild against newer gecko
* Thu Nov 22 2007 Brian Pepple [EMAIL PROTECTED] - 1.4.8-1
- Update to 1.4.8.
- fixes LD_LIBRARY_PATH security bug. CVE-2006-4791
* Thu Nov 15 2007 Brian Pepple [EMAIL PROTECTED] - 1.4.7-1
- Update to 1.4.7.
- Drop opml  nm patches. fixed upstream.
- Update fedora feed patch for 1.4.x.
- add BR on sqlite-devel, dbus-devel, dbus-glib-devel, libglade2-devel.
- Don't build gtkhtml2 plugin for now.
* Tue Nov  6 2007 Brian Pepple [EMAIL PROTECTED] - 1.2.23-6
- Rebuild for new gecko libs.
* Wed Oct 31 2007 Brian Pepple [EMAIL PROTECTED] - 1.2.23-5
- Add patch to fix opml security bug: CVE-2007-5751. (#360641)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 

[SECURITY] Fedora 8 Update: gnome-python2-extras-2.19.1-19.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: gnome-python2-extras
Product : Fedora 8
Version : 2.19.1
Release : 19.fc8
URL : http://www.pygtk.org/
Summary : The sources for additional. PyGNOME Python extension modules.
Description :
The gnome-python-extra package contains the source packages for additional
Python bindings for GNOME. It should be used together with gnome-python.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-19
- Rebuild against newer gecko
* Mon Oct 27 2008 Matthew Barnes [EMAIL PROTECTED] - 2.19.1-18
- Provide Python bindings for anjuta-gdl on ppc64 (RH bug #468693).
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-17
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-16
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-15
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-14
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-13
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-12
- Rebuild against newer gecko
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-11
- Rebuild against newer gecko
* Sat Nov 10 2007 Alex Lancaster [EMAIL PROTECTED] - 2.19.1-10.fc8
- Rebuild against gecko-libs 1.8.1.9

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug 

[SECURITY] Fedora 8 Update: kazehakase-0.5.6-1.fc8.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: kazehakase
Product : Fedora 8
Version : 0.5.6
Release : 1.fc8.1
URL : http://kazehakase.sourceforge.jp/
Summary : Kazehakase browser using Gecko rendering engine
Description :
Kazehakase is a Web browser which aims to provide
a user interface that is truly user-friendly  fully customizable.

This package uses Gecko for HTML rendering engine.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.5.6-1.1
- Rebuild against newer gecko
* Fri Oct 31 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.6-1
- 0.5.6
- -UGTK_DISABLE_DEPRECATED hack removed (hack introduced in upstream)
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED]
- Rebuild against newer gecko (F-9/8)
* Tue Aug  5 2008 Mamoru Tasaka [EMAIL PROTECTED]
- Try rev. 3509
* Wed Jul 30 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.5-1
- 0.5.5
* Sat Jul 19 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-7.svn3506_trunk
- F-9+: relax gecko libs dependency (as GRE_GetGREPathWithProperties properly
  finds out GRE)
- F-10+: add -UGTK_DISABLE_DEPRECATED temporarily
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED]
- Rebuild against newer gecko (F-8)
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED]
- Rebuild against newer gecko (F-8)
* Sat Jun 28 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-6.svn3506_trunk
- Try rev 3506
- Workaround for bug 447444 (xulrunner vs hunspell conflict) (F-9+)
* Wed Jun 25 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-5
- Apply xulrunner related patches from debian by Mike Hommey
  (debian bug 480796, rh bug 402641)
  This time kazehakase actually works with xulrunner!
* Tue Apr 29 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-4
- Remove redundant description per rel-eng team request
* Wed Apr 23 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-3
- F-9: temporizing fix for xulrunner
  * Enable gtk-mozembed - don't work at all, however does not crash
  * force to install WebKit version
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 0.5.4-2.1
- Rebuild against newer gecko (F-8/9)
* Mon Apr 14 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-2
- Rebuild for new WebKit (F-7/8: bug 438531)
* Sun Mar 30 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-1
- 0.5.4
* Fri Mar 28 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.3-6.svn3501_trunk
- Try svn 3501 (still not work against xulrunner :( )
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 0.5.3-5
- Rebuild against newer gecko (F-7/8)
* Wed Mar  5 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.3-4
- Create kazehakase-base, split gecko.so from -base package
  so that users can install only WebKit based package.
* Sun Mar  2 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.3-3
- Support WebGTK
* Sat Mar  1 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.3-1
- 0.5.3
* Fri Feb 29 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.2-8.svn3410_trunk
- More try to use xulrunner
  * GRE version fix
  * Remove seemingly undesirable linking
* Sun Feb 24 2008 

[SECURITY] Fedora 8 Update: openvrml-0.17.10-2.0.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: openvrml
Product : Fedora 8
Version : 0.17.10
Release : 2.0.fc8
URL : http://openvrml.org
Summary : VRML/X3D runtime library
Description :
OpenVRML is a VRML/X3D support library, including a runtime and facilities
for reading and displaying VRML and X3D models.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.10-2.0
- Rebuild against newer gecko
* Sun Oct 26 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.10-1.0
- Updated to 0.17.10.
* Thu Oct  9 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.9-1.0
- Updated to 0.17.9.
* Thu Oct  9 2008 Braden McDaniel  [EMAIL PROTECTED]
- Include two directories in -player pkg.
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.8-2.0
- Rebuild against newer gecko
* Wed Aug 13 2008 Braden McDaniel  [EMAIL PROTECTED]
- Build with -Wno-missing-braces.
* Wed Aug 13 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.8-1.0
- Updated to 0.17.8.
* Tue Aug 12 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.7-1.0
- Updated to 0.17.7.
* Tue Aug 12 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.6-7.0
- Change to x.y convention for the Release number to satisfy Fedora
  packaging scripts.
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.6-6
- Rebuild against newer gecko
* Mon Jul  7 2008 Braden McDaniel [EMAIL PROTECTED] - 0.17.6-5
- gcc visibility flags are still a problem for firefox headers on F8.
* Sun Jul  6 2008 Braden McDaniel [EMAIL PROTECTED] - 0.17.6-4
- Rebuild after updating gecko-libs requirement.
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.6-3
- Rebuild against newer gecko
* Sun Jun 22 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.6-2
- Make symbols for libglade callbacks in openvrml-player visible.
* Fri Jun 20 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.6-1
- Updated to 0.17.6.
- Build with -fvisibility=hidden -fvisibility-inlines-hidden
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.5-5
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.5-4
- Rebuild against newer gecko
* Mon Mar 17 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.5-3
- Patch for crash in openvrml-xembed (bug 437611).
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.5-2
- Rebuild against newer gecko
* Tue Feb  5 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.5-1
- Updated to 0.17.5.
- Added --enable-gecko-rpath.
* Sat Jan 26 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.4-1
- Updated to 0.17.4.
* Thu Jan 17 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.3-1
- Updated to 0.17.3.
* Wed Jan  9 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.2-1
- Updated to 0.17.2.
* Sun Jan  6 2008 Braden McDaniel  [EMAIL PROTECTED] - 0.17.1-1
- Updated to 0.17.1.
* Wed Dec 19 2007 Braden McDaniel  [EMAIL PROTECTED] - 0.17.0-2
- Removed %check.  The browser test fails on ppc due to what looks
  like a probable compiler bug.
* Wed Dec 19 2007 

[SECURITY] Fedora 8 Update: Miro-1.2.7-2.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: Miro
Product : Fedora 8
Version : 1.2.7
Release : 2.fc8
URL : http://www.getmiro.com/
Summary : Miro - Internet TV Player
Description :
Miro is a free application that turns your computer into an
internet TV video player. This release is still a beta version, which means
that there are some bugs, but we're moving quickly to fix them and will be
releasing bug fixes on a regular basis.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.7-2
- Rebuild against newer gecko
* Sun Sep 28 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.7-1
- Update to latest upstream (1.2.7)
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.3-4
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.3-3
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.3-2
- Rebuild against newer gecko
* Tue Apr 29 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.3-1
- Update to new upstream release (1.2.3)
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2-2
- Rebuild against newer gecko
* Sat Mar 29 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2-1
- Update to latest upstream (1.2)
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] 1.1.2-2
- Rebuild against newer gecko
* Tue Mar 11 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.1.2-1
- Update to upstream 1.1.2 release
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] 1.1-3
- Rebuild against newer gecko
* Fri Jan 25 2008 Michel Salim [EMAIL PROTECTED] - 1.1-2
- Fix charset mismatch in download window
- Remove shebangs from scripts
- Sanitize end-of-line markers
* Thu Jan 17 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.1-1
- Update to upstream 1.1 release
- Add BuildRequires: openssl-devel
* Mon Nov 26 2007 Alex Lancaster alexlan[AT]fedoraproject org 1.0-2
- Build against gecko-libs 1.8.1.10 (firefox 2.0.0.10)
* Fri Nov 16 2007 Alex Lancaster alexlan[AT]fedoraproject org 1.0-1
- Update to latest upstream (1.0).
* Fri Nov  9 2007 Alex Lancaster alexlan[AT]fedoraproject org 0.9.9.9-1
- Update to latest upstream (0.9.9.9)
- Build against gecko-libs 1.8.1.9 (firefox 2.0.0.9)
- Include xine_extractor in package (thanks to Jason Farrell)
- Drop Miro-setup.py.patch
* Thu Nov  1 2007 Alex Lancaster alexlan[AT]fedoraproject org 0.9.9.1-6
- Update patch with workaround suggested on:
  http://bugzilla.pculture.org/show_bug.cgi?id=8579
* Wed Oct 31 2007 Alex Lancaster alexlan[AT]fedoraproject org 0.9.9.1-5
- Add setup.py patch to ignore call to svn.
* Tue Oct 30 2007 Alex Lancaster alexlan[AT]fedoraproject org 0.9.9.1-3
- Add BuildRequires: libXv-devel
- Drop dbus patch
* Sun Oct 28 2007 Alex Lancaster alexlan[AT]fedoraproject org 0.9.9.1-1
- Update to latest upstream (0.9.9.1)
* Fri Oct 26 2007 Alex Lancaster alexlan[AT]fedoraproject org 0.9.8.1-8
- Replace Requires and BuildRequires for firefox with gecko 

[SECURITY] Fedora 8 Update: ruby-gnome2-0.17.0-3.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: ruby-gnome2
Product : Fedora 8
Version : 0.17.0
Release : 3.fc8
URL : http://ruby-gnome2.sourceforge.jp/
Summary : Ruby binding of libgnome/libgnomeui-2.x
Description :
This is a set of bindings for the GNOME-2.x libraries for use from Ruby.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.0-3
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.0-2
- Rebuild against newer gecko
* Thu Sep 18 2008 Mamoru Tasaka [EMAIL PROTECTED] 0.17.0-1
- Update to 0.17.0
- Patch from svn to fix Ruby/GLib bug (bug 456816)
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.0-0.3.rc1
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.0-0.2.rc1
- Rebuild against newer gecko
* Sun Jun  8 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.17.0-0.1.rc1
- 0.17.0 rc1
- Remove upstreamed patches - 2 patches remain
  - ruby-gnome2-0.17.0-rc1-script.patch
  - ruby-gnome2-all-0.16.0-xulrunner.patch
- Restrict ruby abi dependency to exact 1.8 version
- Fix the license (to strict LGPLv2)
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 0.16.0-22
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] 0.16.0-21
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] 0.16.0-20
- Rebuild against newer gecko
* Sat Jan 26 2008 Allisson Azevedo [EMAIL PROTECTED] 0.16.0-19
- Fix libglade2 Undefined method error (bugzilla #428781)
* Tue Dec  4 2007 Allisson Azevedo [EMAIL PROTECTED] 0.16.0-18
- Fix CVE-2007-6183, format string vulnerability (bugzilla #402871)
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] 0.16.0-17
- Rebuild against newer gecko
* Tue Nov 13 2007 Alex Lancaster [EMAIL PROTECTED] 0.16.0-16
- Fix my typo in BuildRequires
* Tue Nov 13 2007 Alex Lancaster [EMAIL PROTECTED] 0.16.0-15
- Rebuild against gecko-libs and gecko-devel (firefox 2.0.0.9).

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug 

[SECURITY] Fedora 8 Update: seamonkey-1.1.13-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: seamonkey
Product : Fedora 8
Version : 1.1.13
Release : 1.fc8
URL : http://www.mozilla.org/projects/seamonkey/
Summary : Web browser, e-mail, news, IRC client, HTML editor
Description :
SeaMonkey is an all-in-one Internet application suite. It includes
a browser, mail/news client, IRC client, JavaScript debugger, and
a tool to inspect the DOM for web pages. It is derived from the
application formerly known as Mozilla Application Suite.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Thu Nov 13 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.13-1
- Update to 1.1.13
* Thu Sep 25 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.12-1
- Update to 1.1.12
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.11-1
- Update to 1.1.11
* Tue Jul  8 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.10-1
- Update to 1.1.10
- Use bullet characters to match GTK+
* Thu Apr 17 2008 Kai Engert [EMAIL PROTECTED] - 1.1.9-2
- add several upstream patches, not yet released:
  425576 (crash), 323508, 378132, 390295, 421622
* Fri Mar 28 2008 Kai Engert [EMAIL PROTECTED] - 1.1.9-1
- SeaMonkey 1.1.9
* Fri Feb  8 2008 Kai Engert [EMAIL PROTECTED] - 1.1.8-1
- SeaMonkey 1.1.8
* Sun Dec  2 2007 Kai Engert [EMAIL PROTECTED] - 1.1.7-1
- SeaMonkey 1.1.7
* Mon Nov  5 2007 Kai Engert [EMAIL PROTECTED] - 1.1.6-1
- SeaMonkey 1.1.6
* Fri Oct 19 2007 Kai Engert [EMAIL PROTECTED] - 1.1.5-2
- SeaMonkey 1.1.5

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] 

[SECURITY] Fedora 8 Update: yelp-2.20.0-14.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33


Name: yelp
Product : Fedora 8
Version : 2.20.0
Release : 14.fc8
URL : http://live.gnome.org/Yelp
Summary : A system documentation reader from the Gnome project
Description :
Yelp is the Gnome 2 help/documentation browser. It is designed
to help you browse all the documentation on your system in
one central tool.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.[1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-14
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-13
- Rebuild against newer gecko
* Mon Aug 25 2008 Matthew Barnes [EMAIL PROTECTED] - 2.20.0-12
- Add patch for RH bug #459487 (format string vulnerability).
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-11
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-10
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-9
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-8
- Rebuild against newer gecko
* Fri Feb  8 2008 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-7
- Rebuild against newer gecko
* Tue Nov 27 2007 Christopher Aillon [EMAIL PROTECTED] - 2.20.0-6
- Rebuild against newer gecko
* Mon Nov  5 2007 Matthias Clasen [EMAIL PROTECTED] - 2.20.0-5
- Fix a crash in search (#361041)
* Mon Nov  5 2007 Martin Stransky [EMAIL PROTECTED] - 2.20.0-4
- Rebuild against new firefox
* Sun Nov  4 2007 Matthias Clasen [EMAIL PROTECTED] - 2.20.0-3
- Fix a crash when loading the rarian docs

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP 
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module 
unloading flaw
https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug 

Fedora 8 Update: ganyremote-5.4.1-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9668
2008-11-14 11:11:41


Name: ganyremote
Product : Fedora 8
Version : 5.4.1
Release : 1.fc8
URL : http://anyremote.sourceforge.net/
Summary : GTK frontend for anyRemote
Description :
gAnyRemote package is GTK GUI frontend for anyRemote
(http://anyremote.sourceforge.net/). The overall goal of this project is to
provide remote control service on Linux through Bluetooth, InfraRed, Wi-Fi
or TCP/IP connection.



This update can be installed with the yum update program.  Use 
su -c 'yum update ganyremote' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


[SECURITY] Fedora 9 Update: xulrunner-1.9.0.4-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: xulrunner
Product : Fedora 9
Version : 1.9.0.4
Release : 1.fc9
URL : http://developer.mozilla.org/En/XULRunner
Summary : XUL Runtime for Gecko Applications
Description :
XULRunner provides the XUL Runtime environment for Gecko applications.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] 1.9.0.4-1
- Update to 1.9.0.4
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] 1.9.0.2-1
- Update to 1.9.0.2
* Wed Jul 16 2008 Christopher Aillon [EMAIL PROTECTED] 1.9.0.1-1
- Update to 1.9.0.1
* Mon Jun 30 2008 Dennis Gilmore [EMAIL PROTECTED] 1.9-1.1
- handle sparc arches
* Tue Jun 17 2008 Christopher Aillon [EMAIL PROTECTED] 1.9-1
- Update to 1.9 final
* Thu May 29 2008 Christopher Aillon [EMAIL PROTECTED] 1.9-0.63
- Simplify PS/PDF operators
* Thu May 22 2008 Christopher Aillon [EMAIL PROTECTED] 1.9-0.62
- Upstream patch to fsync() less
* Thu May  8 2008 Colin Walters [EMAIL PROTECTED] 1.9-0.61
- Ensure we enable startup notification; add BR and modify config
  (bug #445543)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace

[SECURITY] Fedora 9 Update: firefox-3.0.4-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: firefox
Product : Fedora 9
Version : 3.0.4
Release : 1.fc9
URL : http://www.mozilla.org/projects/firefox/
Summary : Mozilla Firefox Web browser
Description :
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] 3.0.4-1
- Update to 3.0.4
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] 3.0.2-1
- Update to 3.0.2
* Wed Jul 16 2008 Christopher Aillon [EMAIL PROTECTED] 3.0.1-1
- Update to 3.0.1
* Tue Jun 17 2008 Christopher Aillon [EMAIL PROTECTED] 3.0-1
- Firefox 3 Final
* Thu May  8 2008 Colin Walters [EMAIL PROTECTED] 3.0-0.61
- Rebuild to pick up new xulrunner (bug #445543)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update firefox' at the command line.
For more information, refer to Managing Software 

[SECURITY] Fedora 9 Update: epiphany-2.22.2-5.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: epiphany
Product : Fedora 9
Version : 2.22.2
Release : 5.fc9
URL : http://www.gnome.org/projects/epiphany/
Summary : GNOME web browser based on the Mozilla rendering engine
Description :
Epiphany is a simple GNOME web browser based on the Mozilla rendering
engine.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.2-5
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.2-4
- Rebuild against newer gecko
* Wed Jul 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.2-3
- Rebuild against newer gecko
* Wed Jun 18 2008 Martin Stransky [EMAIL PROTECTED] - 2.22.2-2
- Rebuild against xulrunner
* Wed May 28 2008 Matthias Clasen [EMAIL PROTECTED] - 2.22.2-1
- Update to 2.22.2

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update epiphany' at the command line.
For more information, 

[SECURITY] Fedora 9 Update: chmsee-1.0.1-6.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: chmsee
Product : Fedora 9
Version : 1.0.1
Release : 6.fc9
URL : http://chmsee.gro.clinux.org/
Summary : A Gtk+2 CHM document viewer
Description :
A gtk2 chm document viewer.

It uses chmlib to extract files. It uses gecko to display pages. It supports
displaying multilingual pages due to gecko. It features bookmarks and tabs.
The tabs could be used to jump inside the chm file conveniently. Its UI is
clean and handy, also is well localized. It is actively developed and
maintained. The author of chmsee is Jungle Ji and several other great people.

Hint
* Unlike other chm viewers, chmsee extracts files from chm file, and then read
and display them. The extracted files could be found in $HOME/.chmsee/bookshelf
directory. You can clean those files at any time and there is a special config
option for that.
* The bookmark is related to each file so not all bookmarks will be loaded,
only current file's.
* Try to remove $HOME/.chmsee if you encounter any problem after an upgrade.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.1-6
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 1.0.1-5
- Rebuild against newer gecko
* Fri Jun 20 2008 Martin Stransky [EMAIL PROTECTED] - 1.0.1-4
- Rebuild against new xulrunner
* Sat May 17 2008 bbbush [EMAIL PROTECTED] - 1.0.1-3
- update to 1.0.1
- specify gecko-provider to libxul, add nspr in patch to configure
- BR libgcrypt-devel instead of openssl-devel
* Fri Apr 25 2008 bbbush [EMAIL PROTECTED] - 1.0.0-2.37
- patch from Martin Stransky to fix crash on open files (rh#427622)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption

[SECURITY] Fedora 9 Update: devhelp-0.19.1-6.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: devhelp
Product : Fedora 9
Version : 0.19.1
Release : 6.fc9
URL : http://developer.imendio.com/projects/devhelp
Summary : API document browser
Description :
An API document browser for GNOME 2.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.19.1-6
- Rebuild against newer gecko
* Thu Oct 23 2008 Martin Stransky [EMAIL PROTECTED] - 0.19.1-5
- fixed #399441 - devhelp compiled against xulrunner 
  doesn't seem to pick up css
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 0.19.1-4
- Rebuild against newer gecko
* Wed Jul 16 2008 Christopher Aillon [EMAIL PROTECTED] - 0.19.1-3
- Rebuild against newer gecko
* Wed Jun 18 2008 Owen Taylor [EMAIL PROTECTED] - 0.19.1-2
- Rebuild against xulrunner-1.9
* Mon May 26 2008 Matthew Barnes [EMAIL PROTECTED] - 0.19.1-1
- Update to 0.19.1
* Sun May  4 2008 Matthias Clasen [EMAIL PROTECTED] - 0.19-5
- Fix source url

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902

[SECURITY] Fedora 9 Update: epiphany-extensions-2.22.1-5.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: epiphany-extensions
Product : Fedora 9
Version : 2.22.1
Release : 5.fc9
URL : http://www.gnome.org/projects/epiphany/extensions
Summary : Extensions for Epiphany, the GNOME web browser
Description :
Epiphany Extensions is a collection of extensions for Epiphany, the
GNOME web browser.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.1-5
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.1-4
- Rebuild against newer gecko
* Thu Jul 17 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.1-3
- Rebuild against newer gecko
* Sun Jun 22 2008 Martin Stransky [EMAIL PROTECTED] - 2.22.1-2
- Rebuild against newer gecko

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update epiphany-extensions' at the command line.
For more information, refer to Managing Software with yum,
available at 

[SECURITY] Fedora 9 Update: galeon-2.0.7-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: galeon
Product : Fedora 9
Version : 2.0.7
Release : 3.fc9
URL : http://galeon.sourceforge.net/
Summary : GNOME2 Web browser based on Mozilla
Description :
Galeon is a web browser built around Gecko (Mozilla's rendering
engine) and Necko (Mozilla's networking engine). It's a GNOME web
browser, designed to take advantage of as many GNOME technologies as
makes sense. Galeon was written to do just one thing - browse the web.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.7-3
- Rebuild against newer gecko
* Tue Oct  7 2008 Denis Leroy [EMAIL PROTECTED] - 2.0.7-2
- Added patches to fix default font (#212616) and printing (#449806). Yay.
* Sat Sep 27 2008 Denis Leroy [EMAIL PROTECTED] - 2.0.7-1
- Update to upstream 2.0.7, support for libxul-unstable
- Plugin patch cleanup
- Other patches upstreamed
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 2.0.5-3
- Rebuild against newer gecko
* Wed Jun 18 2008 Denis Leroy [EMAIL PROTECTED] - 2.0.5-2
- Rebuild with xulrunner 1.9

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
 

[SECURITY] Fedora 9 Update: cairo-dock-1.6.3.1-1.fc9.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: cairo-dock
Product : Fedora 9
Version : 1.6.3.1
Release : 1.fc9.1
URL : http://www.cairo-dock.org/
Summary : Light eye-candy fully themable animated dock
Description :
An light eye-candy fully themable animated dock for any
Linux desktop. It has a family-likeness with OSX dock,
but with more options.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:


References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update cairo-dock' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list

[SECURITY] Fedora 9 Update: gtkmozembedmm-1.4.2.cvs20060817-22.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: gtkmozembedmm
Product : Fedora 9
Version : 1.4.2.cvs20060817
Release : 22.fc9
URL : http://gtkmm.sourceforge.net/
Summary : C++ wrapper for GtkMozembed
Description :
This package provides a C++/gtkmm wrapper for GtkMozEmbed
from Mozilla 1.4.x to 1.7.x.
The wrapper provides a convenient interface for C++ programmers
to use the Gtkmozembed HTML-rendering widget inside their software.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.2.cvs20060817-22
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 1.4.2.cvs20060817-21
- Rebuild against newer gecko
* Fri Jun 20 2008 Martin Stransky [EMAIL PROTECTED] - 1.4.2.cvs20060817-20
- rebuild against new gecko-libs 1.9 (xulrunner)
* Sat Apr 12 2008 Haïkel Guémar [EMAIL PROTECTED] - 1.4.2.cvs20060817-19
- remove now useless sed one-liner.
- fixed gtkmozembedmm-1.4.2.cvs20060817-xulrunner.patch
- added gtkmozembedmm-1.4.2.cvs20060817-m4.patch
* Mon Feb 18 2008 Fedora Release Engineering [EMAIL PROTECTED] - 
1.4.2.cvs20060817-18
- Autorebuild for GCC 4.3

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 

[SECURITY] Fedora 9 Update: gnome-python2-extras-2.19.1-21.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: gnome-python2-extras
Product : Fedora 9
Version : 2.19.1
Release : 21.fc9
URL : http://www.pygtk.org/
Summary : The sources for additional. PyGNOME Python extension modules.
Description :
The gnome-python-extra package contains the source packages for additional
Python bindings for GNOME. It should be used together with gnome-python.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-21
- Rebuild against newer gecko
* Mon Oct 27 2008 Matthew Barnes [EMAIL PROTECTED] - 2.19.1-20
- Provide Python bindings for libgdl on ppc64 (RH bug #468693).
* Thu Oct  9 2008 Matthew Barnes [EMAIL PROTECTED] - 2.19.1-19
- Remove gtkspell-static patch.  Appears to not be needed anymore.
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 2.19.1-18
- Rebuild against newer gecko
* Fri Jul 18 2008 Paul W. Frields [EMAIL PROTECTED] - 2.19.1-17.fc9
- Rebuild against new xulrunner (1.9.0.4) and fix dependencies
* Fri Jun 20 2008 Martin Stransky [EMAIL PROTECTED] - 2.19.1-16.fc9
- Rebuild against new gecko-libs 1.9 (xulrunner)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing 

[SECURITY] Fedora 9 Update: gnome-web-photo-0.3-15.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: gnome-web-photo
Product : Fedora 9
Version : 0.3
Release : 15.fc9
URL : http://ftp.gnome.org/pub/GNOME/sources/gnome-web-photo/0.3/
Summary : HTML pages thumbnailer
Description :
gnome-web-photo contains a thumbnailer that will be used by GNOME applications,
including the file manager, to generate screenshots of web pages.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-15
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 0.3-14
- Rebuild against newer gecko
* Mon Jul 21 2008 Martin Stransky [EMAIL PROTECTED] - 0.3-13
- Rebuild against new xulrunner
* Fri Jun 20 2008 Martin Stransky [EMAIL PROTECTED] - 0.3-12
- Rebuild against new xulrunner

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update gnome-web-photo' at the command line.
For more information, refer to Managing 

[SECURITY] Fedora 9 Update: evolution-rss-0.1.0-4.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: evolution-rss
Product : Fedora 9
Version : 0.1.0
Release : 4.fc9
URL : http://gnome.eu.org/evo/index.php/Evolution_RSS_Reader_Plugin
Summary : Evolution RSS Reader
Description :
This is an evolution plugin which enables evolution to read rss feeds.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.1.0-4
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 0.1.0-3
- Rebuild against newer gecko
* Sat Jul  5 2008 Lucian Langa [EMAIL PROTECTED] - 0.1.0-2
- Fix firefox import RH bug #452322
* Wed Jul  2 2008 Lucian Langa [EMAIL PROTECTED] - 0.1.0-1
- Update to 0.1.0 version
* Wed Apr 30 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-9
- Update requirements
* Mon Apr  7 2008 Lucian Langa [EMAIL PROTECTED] - 0.0.8-8
- Force gecko default html render

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 

[SECURITY] Fedora 9 Update: google-gadgets-0.10.1-5.fc9.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: google-gadgets
Product : Fedora 9
Version : 0.10.1
Release : 5.fc9.1
URL : http://code.google.com/p/google-gadgets-for-linux/
Summary : Google Gadgets for Linux
Description :
Google Gadgets for Linux provides a platform for running desktop
gadgets under Linux, catering to the unique needs of Linux users. It
can run, without modification, many Google Desktop gadgets as well as
the Universal Gadgets on iGoogle.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update google-gadgets' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce 

[SECURITY] Fedora 9 Update: Miro-1.2.7-2.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: Miro
Product : Fedora 9
Version : 1.2.7
Release : 2.fc9
URL : http://www.getmiro.com/
Summary : Miro - Internet TV Player
Description :
Miro is a free application that turns your computer into an
internet TV video player. This release is still a beta version, which means
that there are some bugs, but we're moving quickly to fix them and will be
releasing bug fixes on a regular basis.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.7-2
- Rebuild against newer gecko
* Sun Sep 28 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.7-1
- Update to 1.2.7
- Rebuild against gecko-libs 1.9.0.4 (#464205)
* Fri Aug 22 2008 Michel Alexandre Salim [EMAIL PROTECTED] - 1.2.6-3
- Do not create backup files when patching; the backup files get re-added 
during the build process
* Fri Aug 22 2008 Michel Salim [EMAIL PROTECTED] - 1.2.6-2
- Unapply boost patch; boost-1.36 has been backed out for F10
* Fri Aug 22 2008 Michel Salim [EMAIL PROTECTED] - 1.2.6-1
- Update to 1.2.6
- Patch for boost API change
* Tue Aug 12 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.4-4
- Rebuild for new boost (fixes broken deps).
* Sat Jul 19 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.4-3
- Rebuild for xulrunner-1.9.0.1
- Unfortunately we probably need to make this an exact match because
  Miro uses the unstable API, so a rebuild may need to be done on every
  package update to be sure that it will work with new xulrunner updates
* Wed Jun 18 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.4-2
- Rebuild for xulrunner-1.9 final.
* Sun Jun 15 2008 Alex Lancaster alexlan[AT]fedoraproject org - 1.2.4-1
- Update to latest upstream (1.2.4)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - 

[SECURITY] Fedora 9 Update: kazehakase-0.5.6-1.fc9.1

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: kazehakase
Product : Fedora 9
Version : 0.5.6
Release : 1.fc9.1
URL : http://kazehakase.sourceforge.jp/
Summary : Kazehakase browser using Gecko rendering engine
Description :
Kazehakase is a Web browser which aims to provide
a user interface that is truly user-friendly  fully customizable.

This package uses Gecko for HTML rendering engine.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.5.6-1.1
- Rebuild against newer gecko
* Fri Oct 31 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.6-1
- 0.5.6
- -UGTK_DISABLE_DEPRECATED hack removed (hack introduced in upstream)
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED]
- Rebuild against newer gecko (F-9/8)
* Tue Aug  5 2008 Mamoru Tasaka [EMAIL PROTECTED]
- Try rev. 3509
* Wed Jul 30 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.5-1
- 0.5.5
* Sat Jul 19 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-7.svn3506_trunk
- F-9+: relax gecko libs dependency (as GRE_GetGREPathWithProperties properly
  finds out GRE)
- F-10+: add -UGTK_DISABLE_DEPRECATED temporarily
* Tue Jul 15 2008 Christopher Aillon [EMAIL PROTECTED]
- Rebuild against newer gecko (F-8)
* Wed Jul  2 2008 Christopher Aillon [EMAIL PROTECTED]
- Rebuild against newer gecko (F-8)
* Sat Jun 28 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-6.svn3506_trunk
- Try rev 3506
- Workaround for bug 447444 (xulrunner vs hunspell conflict) (F-9+)
* Wed Jun 25 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.5.4-5
- Apply xulrunner related patches from debian by Mike Hommey
  (debian bug 480796, rh bug 402641)
  This time kazehakase actually works with xulrunner!

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption

[SECURITY] Fedora 9 Update: mugshot-1.2.2-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: mugshot
Product : Fedora 9
Version : 1.2.2
Release : 3.fc9
URL : http://mugshot.org/
Summary : Companion software for mugshot.org
Description :
Mugshot works with the server at mugshot.org to extend
the panel, web browser, music player and other parts of the desktop with
a live social experience and interoperation with online services you and
your friends use. It's fun and easy.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.2-3
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 1.2.2-2
- Rebuild against newer gecko
* Wed Jul 30 2008 Owen Taylor [EMAIL PROTECTED] - 1.2.2-1
- Update to 1.2.2 
  - Fixes Firefox min version to 3.0.x,  #451918 again
  - Rebuild against hippo-canvas-0.3
* Wed Jun 18 2008 Owen Taylor [EMAIL PROTECTED] - 1.2.1-1
- Update to 1.2.1 (Fixes Firefox min version #451918)
* Mon Jun 16 2008 Owen Taylor [EMAIL PROTECTED] - 1.2.0-1
- Update to 1.2.0

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902

[SECURITY] Fedora 9 Update: mozvoikko-0.9.5-4.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: mozvoikko
Product : Fedora 9
Version : 0.9.5
Release : 4.fc9
URL : http://voikko.sourceforge.net
Summary : Finnish Voikko spell-checker extension for Mozilla programs
Description :
This is mozvoikko, an extension for Mozilla programs for using the Finnish
spell-checker Voikko.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update mozvoikko' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


[SECURITY] Fedora 9 Update: ruby-gnome2-0.17.0-3.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: ruby-gnome2
Product : Fedora 9
Version : 0.17.0
Release : 3.fc9
URL : http://ruby-gnome2.sourceforge.jp/
Summary : Ruby binding of libgnome/libgnomeui-2.x
Description :
This is a set of bindings for the GNOME-2.x libraries for use from Ruby.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.0-3
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 0.17.0-2
- Rebuild against newer gecko
* Thu Sep 18 2008 Mamoru Tasaka [EMAIL PROTECTED] 0.17.0-1
- Update to 0.17.0
- Patch from svn to fix Ruby/GLib bug (bug 456816)
* Sat Jul 19 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.17.0-0.4.rc1
- F-9+: relax gecko libs dependency
- F-9+: bump version to fix EVR problem between F-8 branch
* Fri Jun 20 2008 Martin Stransky [EMAIL PROTECTED] - 0.17.0-0.2.rc1
- Rebuild against new xulrunner
* Sun Jun  8 2008 Mamoru Tasaka [EMAIL PROTECTED] - 0.17.0-0.1.rc1
- 0.17.0 rc1
- Remove upstreamed patches - 2 patches remain
  - ruby-gnome2-0.17.0-rc1-script.patch
  - ruby-gnome2-all-0.16.0-xulrunner.patch
- Restrict ruby abi dependency to exact 1.8 version
- Fix the license (to strict LGPLv2)

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation

[SECURITY] Fedora 9 Update: seamonkey-1.1.13-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: seamonkey
Product : Fedora 9
Version : 1.1.13
Release : 1.fc9
URL : http://www.mozilla.org/projects/seamonkey/
Summary : Web browser, e-mail, news, IRC client, HTML editor
Description :
SeaMonkey is an all-in-one Internet application suite. It includes
a browser, mail/news client, IRC client, JavaScript debugger, and
a tool to inspect the DOM for web pages. It is derived from the
application formerly known as Mozilla Application Suite.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.13-1
- Update to 1.1.13
* Thu Sep 25 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.12-1
- Update to 1.1.12
* Sun Jul  6 2008 Christopher Aillon [EMAIL PROTECTED] - 1.1.10-1
- Update to 1.1.10
- Use bullet characters to match GTK+

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 'yum update seamonkey' at the command line.
For more 

[SECURITY] Fedora 9 Update: yelp-2.22.1-6.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: yelp
Product : Fedora 9
Version : 2.22.1
Release : 6.fc9
URL : http://live.gnome.org/Yelp
Summary : A system documentation reader from the Gnome project
Description :
Yelp is the Gnome 2 help/documentation browser. It is designed
to help you browse all the documentation on your system in
one central tool.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.1-6
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.1-5
- Rebuild against newer gecko
* Wed Jul 16 2008 Christopher Aillon [EMAIL PROTECTED] - 2.22.1-4
- Rebuild against newer gecko
* Wed Jun 18 2008 Martin Stransky [EMAIL PROTECTED] - 2.22.1-3
- rebuild against xulrunner
* Mon May 19 2008 Matthew Barnes [EMAIL PROTECTED] - 2.22.1-2
- Require docbook-dtds (RH bug #447209).

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
https://bugzilla.redhat.com/show_bug.cgi?id=470902


This update can be installed with the yum update program.  Use 
su -c 

[SECURITY] Fedora 9 Update: totem-2.23.2-8.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49


Name: totem
Product : Fedora 9
Version : 2.23.2
Release : 8.fc9
URL : http://www.gnome.org/projects/totem/
Summary : Movie player for GNOME
Description :
Totem is simple movie player for the Gnome desktop. It features a
simple playlist, a full-screen mode, seek and volume controls, as well as
a pretty complete keyboard navigation.


Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.This update has been rated as having critical
security impact by the Fedora Security Response Team.Mozilla Firefox is an
open source Web browser.Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)A flaw was found
in the way Firefox opened file: URIs. If a file: URI was loaded in the same
tab as a chrome or privileged about: page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.[1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.

ChangeLog:

* Wed Nov 12 2008 Christopher Aillon [EMAIL PROTECTED] - 2.23.2-8
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon [EMAIL PROTECTED] - 2.23.2-7
- Rebuild against newer gecko
* Fri Jul 25 2008 - Bastien Nocera [EMAIL PROTECTED] - 2.23.2-6
- Add patch to make FLV videos thumbnail (#449279)
* Fri Jul 18 2008 Martin Stransky [EMAIL PROTECTED] - 2.23.2-5
- Rebuild against xulrunner 1.9.0.4 and fixed gecko dependency
* Wed Jun 18 2008 Owen Taylor [EMAIL PROTECTED] - 2.23.2-4
- Rebuild against xulrunner 1.9 final
* Wed May  7 2008 - Bastien Nocera [EMAIL PROTECTED] - 2.23.2-3
- Require gstreamer-plugins-flumpegdemux as used by the DVB and DVD
  playback bits

References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 

Fedora 9 Update: homestead-0.92-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9670
2008-11-14 11:11:56


Name: homestead
Product : Fedora 9
Version : 0.92
Release : 1.fc9
URL : http://homestead.sourceforge.net/
Summary : 3D real-time network visualiser
Description :
Homestead is a 3D real-time network visualizer, displaying
hosts and packet traffic. Features include support for
multiple sensors, analysis of packets to gather hostnames
and services, configurable layout of subnetworks,
recording/replaying of packet traffic, and the ability
to filter packets by host, protocol or port.
hsen (Homestead Sensor) is a packet capture daemon which
reads and sends packet header information to Homestead,
locally or remotely. hsen also equates hostname to IP
by reading DNS packets (UDP type A class IN standard
query response). The relationship between hsen to Homestead
can be one-to-one, one-to-many, many-to-one or many-to-many
(many Homesteads would be on multiple computers on the
same subnet, receiving packet header information
from hsen via broadcast).


Update Information:

update


This update can be installed with the yum update program.  Use 
su -c 'yum update homestead' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: ltsp-5.1.34-2.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9671
2008-11-14 11:12:03


Name: ltsp
Product : Fedora 9
Version : 5.1.34
Release : 2.fc9
URL : http://www.ltsp.org
Summary : Linux Terminal Server Project Server and Client
Description :
LTSP client and server


Update Information:

http://wtogami.livejournal.com/28896.html  Many bug fixes and cleanups from the
LTSP Hackfest.ltsp-5.1.34-2.fc9  - jetpipe supports serial printers  -
TIMEZONE and TIMESERVER options for thin clients  - Move LDM to VT1 by default
- Prevent error during client chroot config  - Many other little bug fixes
ldm-2.0.18-1.fc9  - Fix race condition in a clean way without the ugly hack.  -
Improve logging.  - Many little bug fixes and code cleanups.Maureen Duffy
fixed the background of the LDM greeter theme.

ChangeLog:

* Thu Nov 13 2008 Warren Togami [EMAIL PROTECTED] - 5.1.34-2
- Enable plymouth support if supported hardware is detected
- jetpipe supports serial printers
- TIMEZONE and TIMESERVER options for thin clients
- Move LDM to VT1 by default
- Prevent error during client chroot config
- Many other little bug fixes
* Sat Nov  1 2008 Warren Togami [EMAIL PROTECTED] - 5.1.32-1
- Exclude wireless drivers because they cannot netboot, and they can often
  cause boot problems because of missing firmware
- Point Fedora 10 client chroot at Fedora 10 mirrormanager
* Fri Oct 31 2008 Warren Togami [EMAIL PROTECTED] - 5.1.31-1
- Revert upstream change that broke pulseaudio
* Fri Oct 31 2008 Warren Togami [EMAIL PROTECTED] - 5.1.30-2
- ltsp-server requires ldminfod
* Thu Oct 30 2008 Warren Togami [EMAIL PROTECTED] - 5.1.30-1
- ldminfod tells LDM client location of Xsession script
  fallback to client's known location if ldminfod failed to tell it
- ldminfod moved from ltsp-server to ldminfod package
- Add alsa-plugins-pulseaudio to client chroot, should allow most
  localapps to output sound.
- Fix client boot with F10 iproute
- Debug shells on VT2-VT6 are now disabled by default
  edit /var/lib/tftpboot/i386/lts.conf to enable if you need it
* Sun Oct  5 2008 Warren Togami [EMAIL PROTECTED] - 5.1.26-1
- Fix copying of mkinitrd config file within chroot
* Sun Oct  5 2008 Warren Togami [EMAIL PROTECTED] - 5.1.25-1
- Bug #462228 Prevent bogus mkinitrd config from landing on systems who
  accidentally install ltsp-client for no good reason. (Thanks John Ellson)
- Remove irrelevant plugins from package
* Thu Sep 11 2008 Warren Togami [EMAIL PROTECTED] - 5.1.24-1
- lts.conf options: VOLUME, HEADPHONE_VOLUME, PCM_VOLUME, CD_VOLUME, 
FRONT_VOLUME
  Set values higher than default if not specified in lts.conf.
  MIC_VOLUME not set by default, but can be controlled by lts.conf.
- xrexec renamed to ltsp-localapps
- xrexecd.sh renamed to ltsp-localappsd
- fix build on RHEL-5
* Wed Sep 10 2008 Warren Togami [EMAIL PROTECTED] - 5.1.23-1
- Point F8 and F9 client chroot builder at newkey repos
- Ensure that initscripts installs before ltsp-client
* Wed Aug 27 2008 Warren Togami [EMAIL PROTECTED] - 5.1.22-1
- Exclude /var/cache/yum/* from mksquashfs
* Sun Aug 24 2008 Warren Togami [EMAIL PROTECTED] - 5.1.21-1
- Exclude /proc/* and /sys/* from mksquashfs
- Cleanup old kernels and images from tftpdir
* Sun Aug 24 2008 Warren Togami [EMAIL PROTECTED] - 5.1.20-1
- Prep for NBD root boot (requires mkinitrd changes)
- Fix nbdrootd and nbdswapd launch path
- nbdswap detects an unused nbd device before using it
- nbdrootd and nbdswapd uses KEEPALIVE, should die after default 7200 seconds
- ltsp-update-image script to create NBD root images in /opt/ltsp/images
- Cleanup old netboot images from chroot during kernel upgrade
- xrexecd waits for xatom changes instead of polling
- Disable nbdswap if server is running Live
* Thu Aug 14 2008 Warren Togami [EMAIL PROTECTED] - 5.1.19-1
- Initial x86_64 client chroot support (John Ellson)
- Fix chroot-creator so NBI and ELF images are created during client install.
- Use wraplinux to create NBI image.
* Wed Aug 13 2008 Warren Togami [EMAIL PROTECTED] - 5.1.18-1
- cleanups to localapps scripts
- moved localapp stuff from ldm into this package
- Fix nbdswap
  nbd was missing in both client and server
  nbdswapd had a bogus path to nbd-server
- Automatic setup of coreboot/ELF capable Etherboot images
  created by mkelfimage.  dhcpd.conf default serves this to
  any client reporting itself as Etherboot-5.4.
* Fri Aug  8 2008 Warren Togami [EMAIL PROTECTED] - 5.1.15-4
- Include live-config within ltsp-server
* Thu Aug  7 2008 Warren Togami [EMAIL PROTECTED] - 5.1.15-1
- kickstart files are no longer %config(noreplace).
- Many minor fixes to silence error messages during 

Fedora 8 Update: R-GeneR-2.11.1-3.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9191
2008-11-14 11:12:09


Name: R-GeneR
Product : Fedora 8
Version : 2.11.1
Release : 3.fc8
URL : http://www.bioconductor.org/packages/3.fc8/bioc/html/GeneR.html
Summary : R for genes and sequences analysis
Description :
Package manipulating nucleotidic sequences (Embl, Fasta, GenBank).


References:

  [ 1 ] Bug #465750 - Review Request: R-GeneR - R for genes and sequences 
analysis
https://bugzilla.redhat.com/show_bug.cgi?id=465750


This update can be installed with the yum update program.  Use 
su -c 'yum update R-GeneR' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: tennix-0.6.1-4.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-8240
2008-11-14 11:12:12


Name: tennix
Product : Fedora 9
Version : 0.6.1
Release : 4.fc9
URL : http://icculus.org/tennix/
Summary : A simple tennis game
Description :
Tennix! is a SDL port of a simple tennis game.
It features a two-player game mode and a single-player mode
against the computer.


Update Information:

Tennix! is a SDL port of a simple tennis game.  It features a two-player game
mode and a single-player mode  against the computer.

ChangeLog:


References:

  [ 1 ] Bug #445604 - Review Request: tennix - A funny 2D tennis game
https://bugzilla.redhat.com/show_bug.cgi?id=445604


This update can be installed with the yum update program.  Use 
su -c 'yum update tennix' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: superiotool-0-0.14.20081103svn3698.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9354
2008-11-14 11:12:12


Name: superiotool
Product : Fedora 8
Version : 0
Release : 0.14.20081103svn3698.fc8
URL : http://linuxbios.org/index.php/Superiotool
Summary : Simple program for detecting Super I/O on your mainboard
Description :
User-space helper tool which allows you to detect which Super I/O you have
on your mainboard, and it can provide detailed information about the register
contents of the Super I/O.


Update Information:

%changelog  * Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED]
0-0.14.20081103svn3698  - Support for the ITE IT8661F/IT8770F, IT8673F, and
IT8671F/IT8687R  - Add register definitions for W83627HF  - Drop global register
0x07 for all Super I/Os  - Add dump support to ITE IT8726F  - Add Fintek
F71882FG support  - Add some more Super I/O IDs/names

ChangeLog:

* Mon Nov  3 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.14.20081103svn3698
- Support for the ITE IT8661F/IT8770F, IT8673F, and IT8671F/IT8687R
- Add register definitions for W83627HF
- Drop global register 0x07 for all Super I/Os
- Add dump support to ITE IT8726F
- Add Fintek F71882FG support
- Add some more Super I/O IDs/names
* Mon Oct  6 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.13.20080815svn3511
- More ExcludeArch
* Fri Aug 15 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.12.20080815svn3511
- Fixed svn path (LinuxBIOS renamed to Coreboot)
- svn ver. 3511
- add support for SMSC SIO10N268 (trivial)
- add support for 2 new SMSC superio chips
- Add dump support for Winbond (NSC) PC87427
* Sun May 18 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.11.20080518svn3319
- Fixed installation
* Sun May 18 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.10.20080518svn3319
- Add support for dumping ITE IT8718F EC registers
- Detect SMSC SCH5027
- Small cleanups
* Sun Feb 10 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.9.20080210svn3064
- svn ver. 3064
- Added more Winbond W83627EHF chips
* Thu Jan 10 2008 Peter Lemenkov [EMAIL PROTECTED] 0-0.8.20080110svn3011
- svn ver. 3011
- support for NSC PC87317
- support for SMSC LPC47M192
- support for NSC PC97317
- support for NSC PC97307
- support for NSC PC8741x
- support for NSC PC87309
- support for SMSC FDC37C67x
- support for the PC87366
- support for the SMSC LPC47B27x
* Mon Nov 19 2007 Peter Lemenkov [EMAIL PROTECTED] 0.7.20071118svn2975
- Fixed man-page installation
* Sun Nov 18 2007 Peter Lemenkov [EMAIL PROTECTED] 0.6.20071118svn2975
- svn ver. 2975 (support for SMSC LPC47N227, NSC PC8374L, Winbond W83977TF,
  Winbond W83977AF, Winbond W83697SF, NSC PC87360, SMSC FDC37N958FR)
- drop patch1


This update can be installed with the yum update program.  Use 
su -c 'yum update superiotool' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 8 Update: xmlrpc-c-1.06.31-1.fc8

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9674
2008-11-14 11:12:31


Name: xmlrpc-c
Product : Fedora 8
Version : 1.06.31
Release : 1.fc8
URL : http://xmlrpc-c.sourceforge.net/
Summary : A lightweight RPC library based on XML and HTTP
Description :
XML-RPC is a quick-and-easy way to make procedure calls over the
Internet. It converts the procedure call into XML document, sends it
to a remote server using HTTP, and gets back the response as XML.

This library provides a modular implementation of XML-RPC for C and
C++.


Update Information:



ChangeLog:

* Thu Nov 13 2008 Enrico Scholz [EMAIL PROTECTED] - 1.06.31-1
- updated to 1.06.31
- use correct pkg-config script for 'xmlrpc-config server-util' output
  (#471323)
* Sun Mar 16 2008 Enrico Scholz [EMAIL PROTECTED] - 1.06.25-1
- updated to 1.06.25
* Wed Jan  2 2008 Enrico Scholz [EMAIL PROTECTED] - 1.06.23-1
- use correct pkg-config script for 'xmlrpc-config abyss-server'
  output (#355411)
- updated to 1.06.23 (#355411)

References:

  [ 1 ] Bug #471323 - xmlrpc-c-config is broken
https://bugzilla.redhat.com/show_bug.cgi?id=471323


This update can be installed with the yum update program.  Use 
su -c 'yum update xmlrpc-c' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: libgeda-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9676
2008-11-14 11:12:46


Name: libgeda
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org
Summary : Libraries for the gEDA project
Description :
This package contains libgeda, the library needed by gEDA applications.


Update Information:

new upstream release

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
- cleaned rpmlint warnings : unused-direct-shlib-dependencies


This update can be installed with the yum update program.  Use 
su -c 'yum update libgeda' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: R-GeneR-2.11.1-5.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9298
2008-11-14 11:13:13


Name: R-GeneR
Product : Fedora 9
Version : 2.11.1
Release : 5.fc9
URL : http://www.bioconductor.org/packages/5.fc9/bioc/html/GeneR.html
Summary : R for genes and sequences analysis
Description :
Package manipulating nucleotidic sequences (Embl, Fasta, GenBank).


ChangeLog:


References:

  [ 1 ] Bug #465750 - Review Request: R-GeneR - R for genes and sequences 
analysis
https://bugzilla.redhat.com/show_bug.cgi?id=465750


This update can be installed with the yum update program.  Use 
su -c 'yum update R-GeneR' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-symbols-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9679
2008-11-14 11:13:13


Name: geda-symbols
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org
Summary : Electronic symbols for gEDA
Description :
This package contains a bunch of symbols of electronic devices
used by gschem, the gEDA project schematic editor.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-symbols' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-docs-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9679
2008-11-14 11:13:13


Name: geda-docs
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org
Summary : Documentation for gEDA
Description :
This package contains documentation for the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-docs' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-utils-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9680
2008-11-14 11:13:21


Name: geda-utils
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org/tools/utils/index.html
Summary : Several utilities for the gEDA project
Description :
Several utilities for the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release
* Mon Jul  7 2008 Tom spot Callaway [EMAIL PROTECTED] - 20080127-2
- fix conditional comparison


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-utils' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-gattrib-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9680
2008-11-14 11:13:21


Name: geda-gattrib
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org/tools/gattrib/index.html
Summary : Attribute editor for gEDA
Description :
Gattrib is gEDA's attribute editor. It reads a set of gschem .sch files
(schematic files), and creates a spreadsheet showing all components in
rows, with the associated component attributes listed in the columns.
It allows the user to add, modify, or delete component attributes outside
of gschem, and then save the .sch files back out. When it is completed,
it will allow the user to edit attributes attached to components, nets,
and pins. (Currently, only component attribute editing is implemented;
pin attributes are displayed only, and net attributes are TBD.)


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gattrib' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-gnetlist-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9680
2008-11-14 11:13:21


Name: geda-gnetlist
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org/tools/gnetlist/index.html
Summary : Netlister for the gEDA project
Description :
Gnetlist generates netlists from schematics drawn with gschem
(the gEDA schematic editor). Possible output formats are:
- native
- tango
- spice
- allegro
- PCB
- verilog
and others.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gnetlist' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-gsymcheck-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9680
2008-11-14 11:13:21


Name: geda-gsymcheck
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org/tools/gsymcheck/index.html
Summary : Symbol checker for electronics schematics editor
Description :
Gsymcheck is a utility to check symbols for gschem.
It is part of the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gsymcheck' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce


Fedora 9 Update: geda-gschem-20080929-1.fc9

2008-11-14 Thread updates

Fedora Update Notification
FEDORA-2008-9680
2008-11-14 11:13:21


Name: geda-gschem
Product : Fedora 9
Version : 20080929
Release : 1.fc9
URL : http://www.geda.seul.org/tools/gschem/index.html
Summary : Electronics schematics editor
Description :
Gschem is an electronics schematic editor. It is part of the gEDA project.


Update Information:

1.4.1

ChangeLog:

* Tue Nov 11 2008 Chitlesh Goorah chitlesh [AT] fedoraproject DOT org - 
20080929-1
- New upstream release


This update can be installed with the yum update program.  Use 
su -c 'yum update geda-gschem' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys


___
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce