[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 8 Update: chmsee-1.0.0-5.31.fc8



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33
--------------------------------------------------------------------------------

Name        : chmsee
Product     : Fedora 8
Version     : 1.0.0
Release     : 5.31.fc8
URL         : http://chmsee.gro.clinux.org/
Summary     : A Gtk+2 CHM document viewer
Description :
A gtk2 chm document viewer.

It uses chmlib to extract files. It uses gecko to display pages. It supports
displaying multilingual pages due to gecko. It features bookmarks and tabs.
The tabs could be used to jump inside the chm file conveniently. Its UI is
clean and handy, also is well localized. It is actively developed and
maintained. The author of chmsee is Jungle Ji and several other great people.

Hint
* Unlike other chm viewers, chmsee extracts files from chm file, and then read
and display them. The extracted files could be found in $HOME/.chmsee/bookshelf
directory. You can clean those files at any time and there is a special config
option for that.
* The bookmark is related to each file so not all bookmarks will be loaded,
only current file's.
* Try to remove $HOME/.chmsee if you encounter any problem after an upgrade.

--------------------------------------------------------------------------------
Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.    This update has been rated as having critical
security impact by the Fedora Security Response Team.    Mozilla Firefox is an
open source Web browser.    Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)    Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)    A flaw was found
in the way Firefox opened "file:" URIs. If a file: URI was loaded in the same
tab as a chrome or privileged "about:" page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].    All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.    [1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 12 2008 Christopher Aillon <caillon redhat com> - 1.0.0-5.31
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon <caillon redhat com> - 1.0.0-4.31
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon <caillon redhat com> - 1.0.0-3.31
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon <caillon redhat com> - 1.0.0-2.31
- Rebuild against newer gecko
* Wed Apr 16 2008 Christopher Aillon <caillon redhat com> - 1.0.0-2.30
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon <caillon redhat com> - 1.0.0-1.30
- Rebuild against newer gecko
* Tue Mar  4 2008 bbbush <bbbush yuan gmail com> - 1.0.0-1.29
- re-add firefox_version
* Fri Feb  8 2008 Christopher Aillon <caillon redhat com> - 1.0.0-1.28
- Rebuild against newer gecko
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
        https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP redirect
        https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module unloading flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via __proto__ tampering
        https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
        https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in http-index-format parser
        https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in nsFrameManager
        https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla nsXMLHttpRequest::NotifyEventListeners() same-origin violation
        https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses security checks on codebase principals
        https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 13 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default namespace
        https://bugzilla.redhat.com/show_bug.cgi?id=470902
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update chmsee' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]