lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <47b0e1ac.h2KwQo61WBSE28Xk%foresight-security-noreply@foresightlinux.org>
Date: Mon, 11 Feb 2008 15:00:44 -0900
From: Foresight Linux Essential Announcement Service
	<foresight-security-noreply@...esightlinux.org>
To: foresight-security-announce@...ts.rpath.org
Cc: lwn@....net, security-alerts@...uxsecurity.com, bugtraq@...urityfocus.com,
	full-disclosure@...ts.grok.org.uk
Subject: FLEA-2008-0001-1 firefox

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Foresight Linux Essential Advisory: 2008-0001-1
Published: 2008-02-11

Rating: Moderate

Updated Versions:
    firefox=/foresight.rpath.org@fl:1-devel//1/2.0.0.12-1-1
    group-dist=/foresight.rpath.org@fl:1-devel//1/1.4.2-0.7-3

References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
    http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.10
    http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.12

Description:
    Multiple vulnerabilities have been fixed in firefox, the most serious of
    which is thought to allow unauthorized remote execution of abitrary code at
    the permission level of the user running firefox.

- ---

Copyright 2008 Foresight Linux Project
This file is distributed under the terms of the MIT License.
A copy is available at http://www.foresightlinux.org/permanent/mit-license.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.8 (GNU/Linux)
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=67ci
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ