lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1FYDjD-0001wV-Hi@mercury.mandriva.com>
Date: Mon, 24 Apr 2006 20:56:39 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:075 ] - Updated mozilla-firefox packages fix numerous vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:075
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : mozilla-firefox
 Date    : April 24, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities have been discovered in the Mozilla Firefox
 browser that could allow a remote attacker to craft malicious web pages
 that could take advantage of these issues to execute arbitrary code
 with elevated privileges, spoof content, and steal local files,
 cookies, or other information from web pages.  As well, some of these
 vulnerabilities can be exploited to execute arbitrary code with the
 privileges of the user running the browser.
 
 As well, two crasher bugs have been fixed as well.
 
 The updated packages have been patched to fix these problems.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790
 https://bugzilla.mozilla.org/show_bug.cgi?id=275896
 https://bugzilla.mozilla.org/show_bug.cgi?id=330900
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 3780668e99350fecb7e1da24330b7bed  2006.0/RPMS/libnspr4-1.0.6-16.5.20060mdk.i586.rpm
 e322c361441c540c473c17be628c56c5  2006.0/RPMS/libnspr4-devel-1.0.6-16.5.20060mdk.i586.rpm
 5e7771258e4019de67912afd88201043  2006.0/RPMS/libnss3-1.0.6-16.5.20060mdk.i586.rpm
 3b8d26864055478f01723e33a2dd060a  2006.0/RPMS/libnss3-devel-1.0.6-16.5.20060mdk.i586.rpm
 9a5e293de59e94a574f596215c06d7a1  2006.0/RPMS/mozilla-firefox-1.0.6-16.5.20060mdk.i586.rpm
 40de607b8c6fb7a9fcbe09cf194fa306  2006.0/RPMS/mozilla-firefox-devel-1.0.6-16.5.20060mdk.i586.rpm
 70205ca1a829e0be5f571376c492dc93  2006.0/SRPMS/mozilla-firefox-1.0.6-16.5.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 bb30c3560134a888a041faa548e80a93  x86_64/2006.0/RPMS/lib64nspr4-1.0.6-16.5.20060mdk.x86_64.rpm
 30e61853b74326055712d1021f15cec8  x86_64/2006.0/RPMS/lib64nspr4-devel-1.0.6-16.5.20060mdk.x86_64.rpm
 271a6b04c6dbbc4e5eb814dd3c682801  x86_64/2006.0/RPMS/lib64nss3-1.0.6-16.5.20060mdk.x86_64.rpm
 25c9a54f6f77823d37da854e55bac42d  x86_64/2006.0/RPMS/lib64nss3-devel-1.0.6-16.5.20060mdk.x86_64.rpm
 70f565e72131379186f742049453158c  x86_64/2006.0/RPMS/mozilla-firefox-1.0.6-16.5.20060mdk.x86_64.rpm
 6ca25ff70f4fb687bcce8d295b4e7a71  x86_64/2006.0/RPMS/mozilla-firefox-devel-1.0.6-16.5.20060mdk.x86_64.rpm
 70205ca1a829e0be5f571376c492dc93  x86_64/2006.0/SRPMS/mozilla-firefox-1.0.6-16.5.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFETUw0mqjQ0CJFipgRAo/QAJ4qvjL82JiWa5Sttl3vh/mf8wFIkACff65l
c1jhuFefopIrhLAGO8poHA4=
=tQnr
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ