--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49
--------------------------------------------------------------------------------

Name        : chmsee
Product     : Fedora 9
Version     : 1.0.1
Release     : 6.fc9
URL         : http://chmsee.gro.clinux.org/
Summary     : A Gtk+2 CHM document viewer
Description :
A gtk2 chm document viewer.

It uses chmlib to extract files. It uses gecko to display pages. It supports
displaying multilingual pages due to gecko. It features bookmarks and tabs.
The tabs could be used to jump inside the chm file conveniently. Its UI is
clean and handy, also is well localized. It is actively developed and
maintained. The author of chmsee is Jungle Ji and several other great people.

Hint
* Unlike other chm viewers, chmsee extracts files from chm file, and then read
and display them. The extracted files could be found in $HOME/.chmsee/bookshelf
directory. You can clean those files at any time and there is a special config
option for that.
* The bookmark is related to each file so not all bookmarks will be loaded,
only current file's.
* Try to remove $HOME/.chmsee if you encounter any problem after an upgrade.

--------------------------------------------------------------------------------
Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.    This update has been rated as having critical
security impact by the Fedora Security Response Team.    Mozilla Firefox is an
open source Web browser.    Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)    Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)    A flaw was found
in the way Firefox opened "file:" URIs. If a file: URI was loaded in the same
tab as a chrome or privileged "about:" page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].    All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.    [1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 12 2008 Christopher Aillon <[EMAIL PROTECTED]> - 1.0.1-6
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon <[EMAIL PROTECTED]> - 1.0.1-5
- Rebuild against newer gecko
* Fri Jun 20 2008 Martin Stransky <[EMAIL PROTECTED]> - 1.0.1-4
- Rebuild against new xulrunner
* Sat May 17 2008 bbbush <[EMAIL PROTECTED]> - 1.0.1-3
- update to 1.0.1
- specify gecko-provider to "libxul", add nspr in patch to configure
- BR libgcrypt-devel instead of openssl-devel
* Fri Apr 25 2008 bbbush <[EMAIL PROTECTED]> - 1.0.0-2.37
- patch from Martin Stransky to fix crash on open files (rh#427622)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
        https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
        https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory 
corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
        https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in 
nsFrameManager
        https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses 
security checks on codebase principals
        https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via 
__proto__ tampering
        https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory 
corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory 
corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in 
http-index-format parser
        https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla 
nsXMLHttpRequest::NotifyEventListeners() same-origin violation
        https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default 
namespace
        https://bugzilla.redhat.com/show_bug.cgi?id=470902
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update chmsee' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

Reply via email to