lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1FYVur-0003Yn-6I@mercury.mandriva.com>
Date: Tue Apr 25 23:22:02 2006
From: security at mandriva.com (security@...driva.com)
Subject: [ MDKSA-2006:076 ] - Updated mozilla packages fix
	numerous vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:076
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : mozilla
 Date    : April 25, 2006
 Affected: Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities have been discovered in the Mozilla Suite
 that could allow a remote attacker to craft malicious web pages that
 could take advantage of these issues to execute arbitrary code with
 elevated privileges, spoof content, and steal local files, cookies, or
 other information from web pages.  As well, some of these
 vulnerabilities can be exploited to execute arbitrary code with the
 privileges of the user running the browser.
 
 As well, two crasher bugs have been fixed as well.
 
 The updated packages have been patched to fix these problems.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790
 https://bugzilla.mozilla.org/show_bug.cgi?id=275896
 https://bugzilla.mozilla.org/show_bug.cgi?id=330900
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 81dce00119439ab171593eb2976fe547  corporate/3.0/RPMS/libnspr4-1.7.8-0.8.C30mdk.i586.rpm
 c0e04b64accc75483ca0795af33562be  corporate/3.0/RPMS/libnspr4-devel-1.7.8-0.8.C30mdk.i586.rpm
 288e4e8379aa0d7cc56327ba60035e0a  corporate/3.0/RPMS/libnss3-1.7.8-0.8.C30mdk.i586.rpm
 c1bac96a978df5d75cfd7887a09144d5  corporate/3.0/RPMS/libnss3-devel-1.7.8-0.8.C30mdk.i586.rpm
 0d06c6a4520068a368cf48e3f407c74e  corporate/3.0/RPMS/mozilla-1.7.8-0.8.C30mdk.i586.rpm
 73f9e85c4556834db6ef9333b98beef0  corporate/3.0/RPMS/mozilla-devel-1.7.8-0.8.C30mdk.i586.rpm
 6939f71693b40125b5c3dd0534441d4a  corporate/3.0/RPMS/mozilla-dom-inspector-1.7.8-0.8.C30mdk.i586.rpm
 cb3df735d1ce023dd9cfeed26889c91b  corporate/3.0/RPMS/mozilla-enigmail-1.7.8-0.8.C30mdk.i586.rpm
 7aee6465cb0a42c6561b3c3deac96c8d  corporate/3.0/RPMS/mozilla-enigmime-1.7.8-0.8.C30mdk.i586.rpm
 01ec6255f2071d246ef76a11b2844c8e  corporate/3.0/RPMS/mozilla-irc-1.7.8-0.8.C30mdk.i586.rpm
 8d4075f4c1c9cd4f613a68ff15f09d85  corporate/3.0/RPMS/mozilla-js-debugger-1.7.8-0.8.C30mdk.i586.rpm
 cc4bcc8c9c19557513ef30d96150b9fe  corporate/3.0/RPMS/mozilla-mail-1.7.8-0.8.C30mdk.i586.rpm
 05ab0503358b30c10dba88bb916473be  corporate/3.0/RPMS/mozilla-spellchecker-1.7.8-0.8.C30mdk.i586.rpm
 ddccba24ecfaa9f82167a7bb5c9c71ad  corporate/3.0/SRPMS/mozilla-1.7.8-0.8.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 9a8e62df1100fa84600706050870a63e  x86_64/corporate/3.0/RPMS/lib64nspr4-1.7.8-0.8.C30mdk.x86_64.rpm
 17c9c8233a462fc91061554c0a0ef451  x86_64/corporate/3.0/RPMS/lib64nspr4-devel-1.7.8-0.8.C30mdk.x86_64.rpm
 efa25dec22975bab70c748d07e0a3c75  x86_64/corporate/3.0/RPMS/lib64nss3-1.7.8-0.8.C30mdk.x86_64.rpm
 38de0287eaf7ed9f2e319cbcc042dcdf  x86_64/corporate/3.0/RPMS/lib64nss3-devel-1.7.8-0.8.C30mdk.x86_64.rpm
 18393cfe8c07b958e52a6f0f2b506e53  x86_64/corporate/3.0/RPMS/mozilla-1.7.8-0.8.C30mdk.x86_64.rpm
 e6aea2fc34c466383781cb6487964cc0  x86_64/corporate/3.0/RPMS/mozilla-devel-1.7.8-0.8.C30mdk.x86_64.rpm
 be9a4c7519f064b07b48ea9556866f74  x86_64/corporate/3.0/RPMS/mozilla-dom-inspector-1.7.8-0.8.C30mdk.x86_64.rpm
 085cc65fea8f657875c5024c0d964a5d  x86_64/corporate/3.0/RPMS/mozilla-enigmail-1.7.8-0.8.C30mdk.x86_64.rpm
 1b6244b6bf96093518937ccf8dcd33c6  x86_64/corporate/3.0/RPMS/mozilla-enigmime-1.7.8-0.8.C30mdk.x86_64.rpm
 e66333a5573e85f32effe85a01a64a27  x86_64/corporate/3.0/RPMS/mozilla-irc-1.7.8-0.8.C30mdk.x86_64.rpm
 4bfb009ca3dcdc90ff1eb2f244cafdc4  x86_64/corporate/3.0/RPMS/mozilla-js-debugger-1.7.8-0.8.C30mdk.x86_64.rpm
 caddf105e2756d3bebf74ad2f4e8a0d6  x86_64/corporate/3.0/RPMS/mozilla-mail-1.7.8-0.8.C30mdk.x86_64.rpm
 f1551cc11e1e75be6d25cf2f53070ac0  x86_64/corporate/3.0/RPMS/mozilla-spellchecker-1.7.8-0.8.C30mdk.x86_64.rpm
 ddccba24ecfaa9f82167a7bb5c9c71ad  x86_64/corporate/3.0/SRPMS/mozilla-1.7.8-0.8.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFETnBTmqjQ0CJFipgRArcTAKDcxTz/GNX8kqak3RR/7w24zwM07gCgiFlz
qBCSTPZ9EPi5eHFsxhS4f2A=
=n4oP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ