[SECURITY] Fedora 13 Update: seamonkey-2.0.6-1.fc13

updates at fedoraproject.org updates at fedoraproject.org
Fri Jul 23 02:31:36 UTC 2010


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-11327
2010-07-23 01:55:48
--------------------------------------------------------------------------------

Name        : seamonkey
Product     : Fedora 13
Version     : 2.0.6
Release     : 1.fc13
URL         : http://www.mozilla.org/projects/seamonkey/
Summary     : Web browser, e-mail, news, IRC client, HTML editor
Description :
SeaMonkey is an all-in-one Internet application suite. It includes
a browser, mail/news client, IRC client, JavaScript debugger, and
a tool to inspect the DOM for web pages. It is derived from the
application formerly known as Mozilla Application Suite.

--------------------------------------------------------------------------------
Update Information:

Update to new upstream SeaMonkey version 2.0.6, fixing multiple security issues
detailed in the upstream advisories:    http://www.mozilla.org/security/known-
vulnerabilities/seamonkey20.html#seamonkey2.0.6
--------------------------------------------------------------------------------
ChangeLog:

* Tue Jul 20 2010 Martin Stransky <stransky at redhat.com> 2.0.6-1
- Update to 2.0.6
* Wed Jun 23 2010 Martin Stransky <stransky at redhat.com> 2.0.5-1
- Update to 2.0.5
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #615455 - CVE-2010-1211 Mozilla miscellaneous memory safety hazards
        https://bugzilla.redhat.com/show_bug.cgi?id=615455
  [ 2 ] Bug #615458 - CVE-2010-1208 Mozilla DOM attribute cloning remote code execution vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=615458
  [ 3 ] Bug #615459 - CVE-2010-1209 Mozilla Use-after-free error in NodeIterator
        https://bugzilla.redhat.com/show_bug.cgi?id=615459
  [ 4 ] Bug #615462 - CVE-2010-1214 Mozilla Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=615462
  [ 5 ] Bug #615464 - CVE-2010-2752 Mozilla nsCSSValue::Array index integer overflow
        https://bugzilla.redhat.com/show_bug.cgi?id=615464
  [ 6 ] Bug #615466 - CVE-2010-2753 Mozilla nsTreeSelection dangling pointer remote code execution vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=615466
  [ 7 ] Bug #608238 - CVE-2010-1205 libpng: out-of-bounds memory write
        https://bugzilla.redhat.com/show_bug.cgi?id=608238
  [ 8 ] Bug #615471 - CVE-2010-1213 Mozilla Cross-origin data disclosure via Web Workers and importScripts
        https://bugzilla.redhat.com/show_bug.cgi?id=615471
  [ 9 ] Bug #608763 - CVE-2010-1206 Firefox: Spoofing attacks via vectors involving 'No Content' status code or via a windows.stop call
        https://bugzilla.redhat.com/show_bug.cgi?id=608763
  [ 10 ] Bug #615480 - CVE-2010-2751 Mozilla SSL spoofing with history.back() and history.forward()
        https://bugzilla.redhat.com/show_bug.cgi?id=615480
  [ 11 ] Bug #568231 - CVE-2010-0654 firefox: cross-domain information disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=568231
  [ 12 ] Bug #615488 - CVE-2010-2754 Mozilla Cross-origin data leakage from script filename in error messages
        https://bugzilla.redhat.com/show_bug.cgi?id=615488
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update seamonkey' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list