[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 8 Update: kazehakase-0.5.4-2.fc8.2



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-6127
2008-07-06 04:44:59
--------------------------------------------------------------------------------

Name        : kazehakase
Product     : Fedora 8
Version     : 0.5.4
Release     : 2.fc8.2
URL         : http://kazehakase.sourceforge.jp/
Summary     : Kazehakase browser using Gecko rendering engine
Description :
Kazehakase is a Web browser which aims to provide
a user interface that is truly user-friendly & fully customizable.

This package uses Gecko for HTML rendering engine.
If you want to use WebKit for HTML rendering engine, install
"kazehakase-webkit" rpm instead.

--------------------------------------------------------------------------------
Update Information:

Updated firefox packages that fix several security issues are now available for
Fedora 8.    This update has been rated as having critical security impact by
the Fedora Security Response Team.    Multiple flaws were found in the
processing of malformed JavaScript content. A web page containing such malicious
content could cause Firefox to crash or, potentially, execute arbitrary code as
the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)
Several flaws were found in the processing of malformed web content. A web page
containing malicious content could cause Firefox to crash or, potentially,
execute arbitrary code as the user running Firefox. (CVE-2008-2798,
CVE-2008-2799, CVE-2008-2811)    Several flaws were found in the way malformed
web content was displayed. A web page containing specially-crafted content could
potentially trick a Firefox user into surrendering sensitive information.
(CVE-2008-2800)    Two local file disclosure flaws were found in Firefox. A web
page containing malicious content could cause Firefox to reveal the contents of
a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)    A flaw was
found in the way a malformed .properties file was processed by Firefox. A
malicious extension could read uninitialized memory, possibly leaking sensitive
data to the extension. (CVE-2008-2807)    A flaw was found in the way Firefox
escaped a listing of local file names. If a user could be tricked into listing a
local directory containing malicious file names, arbitrary JavaScript could be
run with the permissions of the user running Firefox. (CVE-2008-2808)    A flaw
was found in the way Firefox displayed information about self-signed
certificates. It was possible for a self-signed certificate to contain multiple
alternate name entries, which were not all displayed to the user, allowing them
to mistakenly extend trust to an unknown site. (CVE-2008-2809)    Updated
packages update Mozilla Firefox to upstream version 2.0.0.15 to address these
flaws:    http://www.mozilla.org/projects/security/known-
vulnerabilities.html#firefox2.0.0.15    This update also contains blam, chmsee,
devhelp, epiphany, epiphany-extensions, galeon, gnome-python2-extras, gnome-web-
photo, gtkmozembedmm, kazehakase, liferea, Miro, openvrml, ruby-gnome2 and yelp
packages rebuilt against new Firefox / Gecko libraries.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jul  2 2008 Christopher Aillon <caillon redhat com> - 0.5.4-2.2
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon <caillon redhat com> - 0.5.4-2.1
- Rebuild against newer gecko
* Mon Apr 14 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.4-2
- Rebuild for new WebKit (F-7/8: bug 438531)
* Sun Mar 30 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.4-1
- 0.5.4
* Fri Mar 28 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.3-6.svn3501_trunk
- Try svn 3501 (still not work against xulrunner :( )
* Tue Mar 25 2008 Christopher Aillon <caillon redhat com> - 0.5.3-5
- Rebuild against newer gecko (F-7/8)
* Wed Mar  5 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.3-4
- Create kazehakase-base, split gecko.so from -base package
  so that users can install only WebKit based package.
* Sun Mar  2 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.3-3
- Support WebGTK
* Sat Mar  1 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.3-1
- 0.5.3
* Fri Feb 29 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.2-8.svn3410_trunk
- More try to use xulrunner
  * GRE version fix
  * Remove seemingly undesirable linking
* Sun Feb 24 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.2-7.svn3391_trunk
- More try to use xulrunner
  * Fix linkage for gecko.so
  * Don't use MOZILLA_INTERNAL_API anymore
  * NS_NewStorageStream should be changed to use xpcom
    http://developer.mozilla.org/en/docs/Migrating_from_Internal_Linkage_to_Frozen_Linkage
* Sat Feb 23 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.2-2.svn3391_trunk
- F-9: Try latest svn for xulrunner
* Fri Feb 15 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.2-1.2.svn3358
- F-9: Try latest svn for xulrunner
  (Still build explicitly disabled. Now it builds, does not crash
   but hangs eternally...)
* Sat Feb  9 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp>
- Rebuild for new gecko engine (F-7/F-8)
* Wed Jan 30 2008 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.2-1
- 0.5.2
* Tue Nov 27 2007 Christopher Aillon <caillon redhat com>
- F-7/8: Rebuild against newer gecko
* Mon Nov 12 2007 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.0-2
- F-9: try to switch to xulrunner
* Tue Nov  6 2007 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.0-1.dist.1
- Rebuild against new gecko engine
- Switch to use gecko virtual dependency (bug 352091)
* Mon Oct 29 2007 Mamoru Tasaka <mtasaka ioa s u-tokyo ac jp> - 0.5.0-1
- 0.5.0
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #452602 - CVE-2008-2803 Firefox javascript arbitrary code execution
        https://bugzilla.redhat.com/show_bug.cgi?id=452602
  [ 2 ] Bug #452599 - CVE-2008-2800 Firefox XSS attacks
        https://bugzilla.redhat.com/show_bug.cgi?id=452599
  [ 3 ] Bug #452600 - CVE-2008-2802 Firefox arbitrary JavaScript code execution
        https://bugzilla.redhat.com/show_bug.cgi?id=452600
  [ 4 ] Bug #452605 - CVE-2008-2801 Firefox arbitrary signed JAR code execution
        https://bugzilla.redhat.com/show_bug.cgi?id=452605
  [ 5 ] Bug #452604 - CVE-2008-2805 Firefox arbitrary file disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=452604
  [ 6 ] Bug #452597 - CVE-2008-2798 Firefox malformed web content flaws
        https://bugzilla.redhat.com/show_bug.cgi?id=452597
  [ 7 ] Bug #452598 - CVE-2008-2799 Firefox javascript arbitrary code execution
        https://bugzilla.redhat.com/show_bug.cgi?id=452598
  [ 8 ] Bug #452710 - CVE-2008-2808 Firefox file location escaping flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=452710
  [ 9 ] Bug #452709 - CVE-2008-2807 Firefox .properties memory leak
        https://bugzilla.redhat.com/show_bug.cgi?id=452709
  [ 10 ] Bug #453007 - CVE-2008-2811 Firefox block reflow flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=453007
  [ 11 ] Bug #452712 - CVE-2008-2810 Firefox arbitrary file disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=452712
  [ 12 ] Bug #452711 - CVE-2008-2809 Firefox self signed certificate flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=452711
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update kazehakase' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]