lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200607270006.k6R06rGA002324@lambchop.rdu.rpath.com>
Date: Wed, 26 Jul 2006 20:06:53 -0400
From: "Justin M. Forbes" <jmforbes@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2006-0137-1 firefox

rPath Security Advisory: 2006-0137-1
Published: 2006-07-26
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    User Deterministic Unauthorized Access
Updated Versions:
    firefox=/conary.rpath.com@rpl:devel//1/1.5.0.5-1-0.1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
    https://issues.rpath.com/browse/RPL-536
    http://www.mozilla.org/security/announce/2006/mfsa2006-44.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-45.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-46.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-47.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-48.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-50.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-51.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-52.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-53.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-54.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-55.html
    http://www.mozilla.org/security/announce/2006/mfsa2006-56.html

Description:
    Previous versions of the firefox browser have multiple
    vulnerabilities, some of which are known to allow remote servers
    to compromise user accounts.  The firefox browser is the default
    browser on rPath Linux, and all users are strongly recommended to
    update firefox and thunderbird as soon as possible.
    

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ