[SECURITY] Fedora 11 Update: monodevelop-2.0-6.fc11

updates at fedoraproject.org updates at fedoraproject.org
Thu Oct 29 02:59:35 UTC 2009


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-10878
2009-10-29 02:34:53
--------------------------------------------------------------------------------

Name        : monodevelop
Product     : Fedora 11
Version     : 2.0
Release     : 6.fc11
URL         : http://monodevelop.com/
Summary     : A full-featured IDE for Mono and Gtk#
Description :
This package provides MonoDevelop, a full-featured IDE for Mono with
syntax colouring, code completion, debugging, project management and
support for C sharp, Visual Basic.NET, Java, Boo, Nemerle and MSIL.

--------------------------------------------------------------------------------
Update Information:

Update to new upstream Firefox version 3.5.4, fixing multiple security issues
detailed in the upstream advisories:    http://www.mozilla.org/security/known-
vulnerabilities/firefox35.html#firefox3.5.4    Update also includes all packages
depending on gecko-libs rebuilt against new version of Firefox / XULRunner.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 27 2009 Jan Horak <jhorak at redhat.com> - 2.0-6
- Rebuild against newer gecko
* Wed Sep  9 2009 Jan Horak <jhorak at redhat.com> - 2.0-5
- Rebuild against newer gecko
* Tue Aug  4 2009 Jan Horak <jhorak at redhat.com> - 2.0-4
- Rebuild against newer gecko
* Tue Jun 30 2009 Christopher Aillon <caillon at redhat.com> - 2.0-3
- Rebuild against newer gecko
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #530567 - CVE-2009-3380 Firefox crashes with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=530567
  [ 2 ] Bug #530168 - CVE-2009-3376 Firefox download filename spoofing with RTL override
        https://bugzilla.redhat.com/show_bug.cgi?id=530168
  [ 3 ] Bug #530167 - CVE-2009-3375 Firefox cross-origin data theft through document.getSelection()
        https://bugzilla.redhat.com/show_bug.cgi?id=530167
  [ 4 ] Bug #530162 - CVE-2009-1563 Firefox heap buffer overflow in string to number conversion
        https://bugzilla.redhat.com/show_bug.cgi?id=530162
  [ 5 ] Bug #530157 - CVE-2009-3374 Firefox chrome privilege escalation in XPCVariant::VariantDataToJS()
        https://bugzilla.redhat.com/show_bug.cgi?id=530157
  [ 6 ] Bug #530156 - CVE-2009-3373 Firefox heap buffer overflow in GIF color map parser
        https://bugzilla.redhat.com/show_bug.cgi?id=530156
  [ 7 ] Bug #530155 - CVE-2009-3372 Firefox crash in proxy auto-configuration regexp parsing
        https://bugzilla.redhat.com/show_bug.cgi?id=530155
  [ 8 ] Bug #524815 - CVE-2009-3274 Firefox: Predictable /tmp pathname use
        https://bugzilla.redhat.com/show_bug.cgi?id=524815
  [ 9 ] Bug #530151 - CVE-2009-3370 Firefox form history vulnerable to stealing
        https://bugzilla.redhat.com/show_bug.cgi?id=530151
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update monodevelop' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the package-announce mailing list