lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200607270006.k6R06rGA002324@lambchop.rdu.rpath.com> Date: Wed, 26 Jul 2006 20:06:53 -0400 From: "Justin M. Forbes" <jmforbes@...th.com> To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com Subject: rPSA-2006-0137-1 firefox rPath Security Advisory: 2006-0137-1 Published: 2006-07-26 Products: rPath Linux 1 Rating: Major Exposure Level Classification: User Deterministic Unauthorized Access Updated Versions: firefox=/conary.rpath.com@rpl:devel//1/1.5.0.5-1-0.1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 https://issues.rpath.com/browse/RPL-536 http://www.mozilla.org/security/announce/2006/mfsa2006-44.html http://www.mozilla.org/security/announce/2006/mfsa2006-45.html http://www.mozilla.org/security/announce/2006/mfsa2006-46.html http://www.mozilla.org/security/announce/2006/mfsa2006-47.html http://www.mozilla.org/security/announce/2006/mfsa2006-48.html http://www.mozilla.org/security/announce/2006/mfsa2006-50.html http://www.mozilla.org/security/announce/2006/mfsa2006-51.html http://www.mozilla.org/security/announce/2006/mfsa2006-52.html http://www.mozilla.org/security/announce/2006/mfsa2006-53.html http://www.mozilla.org/security/announce/2006/mfsa2006-54.html http://www.mozilla.org/security/announce/2006/mfsa2006-55.html http://www.mozilla.org/security/announce/2006/mfsa2006-56.html Description: Previous versions of the firefox browser have multiple vulnerabilities, some of which are known to allow remote servers to compromise user accounts. The firefox browser is the default browser on rPath Linux, and all users are strongly recommended to update firefox and thunderbird as soon as possible. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/