[SECURITY] Fedora 9 Update: kazehakase-0.5.6-1.fc9.1

updates at fedoraproject.org updates at fedoraproject.org
Fri Nov 14 12:52:42 UTC 2008


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9669
2008-11-14 11:11:49
--------------------------------------------------------------------------------

Name        : kazehakase
Product     : Fedora 9
Version     : 0.5.6
Release     : 1.fc9.1
URL         : http://kazehakase.sourceforge.jp/
Summary     : Kazehakase browser using Gecko rendering engine
Description :
Kazehakase is a Web browser which aims to provide
a user interface that is truly user-friendly & fully customizable.

This package uses Gecko for HTML rendering engine.

--------------------------------------------------------------------------------
Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 9.    This update has been rated as having critical
security impact by the Fedora Security Response Team.    Mozilla Firefox is an
open source Web browser.    Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)    Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)    A flaw was found
in the way Firefox opened "file:" URIs. If a file: URI was loaded in the same
tab as a chrome or privileged "about:" page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 3.0.4[1].    All firefox users and users of packages
depending on xulrunner[2] should upgrade to these updated packages, which
contain patches that correct these issues.    [1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.4  [2] cairo-dock chmsee devhelp
epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras gnome-
web-photo google-gadgets gtkmozembedmm kazehakase Miro mozvoikko mugshot ruby-
gnome2 totem yelp  Provides Python bindings for libgdl on PPC64.  This update
fixes a build break.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 12 2008 Christopher Aillon <caillon at redhat.com> - 0.5.6-1.1
- Rebuild against newer gecko
* Fri Oct 31 2008 Mamoru Tasaka <mtasaka at ioa.s.u-tokyo.ac.jp> - 0.5.6-1
- 0.5.6
- -UGTK_DISABLE_DEPRECATED hack removed (hack introduced in upstream)
* Wed Sep 24 2008 Christopher Aillon <caillon at redhat.com>
- Rebuild against newer gecko (F-9/8)
* Tue Aug  5 2008 Mamoru Tasaka <mtasaka at ioa.s.u-tokyo.ac.jp>
- Try rev. 3509
* Wed Jul 30 2008 Mamoru Tasaka <mtasaka at ioa.s.u-tokyo.ac.jp> - 0.5.5-1
- 0.5.5
* Sat Jul 19 2008 Mamoru Tasaka <mtasaka at ioa.s.u-tokyo.ac.jp> - 0.5.4-7.svn3506_trunk
- F-9+: relax gecko libs dependency (as GRE_GetGREPathWithProperties properly
  finds out GRE)
- F-10+: add -UGTK_DISABLE_DEPRECATED temporarily
* Tue Jul 15 2008 Christopher Aillon <caillon at redhat.com>
- Rebuild against newer gecko (F-8)
* Wed Jul  2 2008 Christopher Aillon <caillon at redhat.com>
- Rebuild against newer gecko (F-8)
* Sat Jun 28 2008 Mamoru Tasaka <mtasaka at ioa.s.u-tokyo.ac.jp> - 0.5.4-6.svn3506_trunk
- Try rev 3506
- Workaround for bug 447444 (xulrunner vs hunspell conflict) (F-9+)
* Wed Jun 25 2008 Mamoru Tasaka <mtasaka at ioa.s.u-tokyo.ac.jp> - 0.5.4-5
- Apply xulrunner related patches from debian by Mike Hommey
  (debian bug 480796, rh bug 402641)
  This time kazehakase actually works with xulrunner!
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
        https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470876 - CVE-2008-5015 Mozilla file: URIs inherit chrome privileges
        https://bugzilla.redhat.com/show_bug.cgi?id=470876
  [ 3 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 4 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
        https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 5 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in nsFrameManager
        https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 6 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses security checks on codebase principals
        https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 7 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via __proto__ tampering
        https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 8 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 9 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 10 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in http-index-format parser
        https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla nsXMLHttpRequest::NotifyEventListeners() same-origin violation
        https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default namespace
        https://bugzilla.redhat.com/show_bug.cgi?id=470902
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update kazehakase' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the Fedora-package-announce mailing list