[SECURITY] Fedora 8 Update: epiphany-2.20.3-8.fc8

updates at fedoraproject.org updates at fedoraproject.org
Fri Nov 14 12:50:27 UTC 2008


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9667
2008-11-14 11:11:33
--------------------------------------------------------------------------------

Name        : epiphany
Product     : Fedora 8
Version     : 2.20.3
Release     : 8.fc8
URL         : http://www.gnome.org/projects/epiphany/
Summary     : GNOME web browser based on the Mozilla rendering engine
Description :
epiphany is a simple GNOME web browser based on the Mozilla rendering
engine.

--------------------------------------------------------------------------------
Update Information:

Updated firefox and xulrunner packages that fix various security issues are now
available for Fedora Core 8.    This update has been rated as having critical
security impact by the Fedora Security Response Team.    Mozilla Firefox is an
open source Web browser.    Several flaws were found in the processing of
malformed web content. A web page containing malicious content could cause
Firefox to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021)    Several flaws were found in the
way malformed content was processed. A web site containing specially-crafted
content could potentially trick a Firefox user into surrendering sensitive
information. (CVE-2008-5022, CVE-2008-5023, CVE-2008-5024)    A flaw was found
in the way Firefox opened "file:" URIs. If a file: URI was loaded in the same
tab as a chrome or privileged "about:" page, the file: URI could execute
arbitrary code with the permissions of the user running Firefox. (CVE-2008-5015)
For technical details regarding these flaws, please see the Mozilla security
advisories for Firefox 2.0.0.18[1].    All firefox users and users of packages
depending on firefox[2] should upgrade to these updated packages, which correct
these issues.    [1] http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18  [2] blam cairo-dock chmsee
devhelp epiphany epiphany-extensions evolution-rss galeon gnome-python2-extras
gnome-web-photo kazehakase liferea Miro openvrml ruby-gnome2 yelp  Provides
Python bindings for libgdl on PPC64.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 12 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-8
- Rebuild against newer gecko
* Tue Sep 23 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-7
- Rebuild against newer gecko
* Tue Jul 15 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-6
- Rebuild against newer gecko
* Wed Jul  2 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-5
- Rebuild against newer gecko
* Sun Apr 27 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-4
- Stop shipping LowContrastLargePrint icons
* Wed Apr 16 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-3
- Rebuild against newer gecko
* Tue Mar 25 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-2
- Rebuild against newer gecko
* Sat Mar  8 2008 Christopher Aillon <caillon at redhat.com> - 2.20.3-1
- Update to 2.20.3
* Sat Mar  8 2008 Christopher Aillon <caillon at redhat.com> - 2.20.2-4
- Update the useragent for Fedora
* Fri Feb  8 2008 Christopher Aillon <caillon at redhat.com> - 2.20.2-3
- Rebuild against newer gecko
* Thu Nov 29 2007 Martin Stransky <stransky at redhat.com> - 2.20.2-2
- Polished wrapper patch
* Tue Nov 27 2007 Matthias Clasen <mclasen at redhat.com> - 2.20.2-1
- Update to 2.20.2
* Tue Nov 27 2007 Christopher Aillon <caillon at redhat.com> - 2.20.1-6
- Rebuild against newer gecko
* Mon Nov 19 2007 Martin Stransky <stransky at redhat.com> - 2.20.1-5
- Updated wrapper patch
* Mon Nov  5 2007 Martin Stransky <stransky at redhat.com> - 2.20.1-4
- Rebuild against new firefox
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #470903 - CVE-2008-4582 Mozilla same origin policy bypass
        https://bugzilla.redhat.com/show_bug.cgi?id=470903
  [ 2 ] Bug #470864 - CVE-2008-5012 Mozilla Image stealing via canvas and HTTP redirect
        https://bugzilla.redhat.com/show_bug.cgi?id=470864
  [ 3 ] Bug #470867 - CVE-2008-5013 Mozilla Flash Player dynamic module unloading flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=470867
  [ 4 ] Bug #470873 - CVE-2008-5014 Mozilla crash and remote code execution via __proto__ tampering
        https://bugzilla.redhat.com/show_bug.cgi?id=470873
  [ 5 ] Bug #470881 - CVE-2008-5016 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470881
  [ 6 ] Bug #470883 - CVE-2008-5017 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470883
  [ 7 ] Bug #470884 - CVE-2008-5018 Mozilla crash with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=470884
  [ 8 ] Bug #470889 - CVE-2008-5019 Mozilla XSS via session restore
        https://bugzilla.redhat.com/show_bug.cgi?id=470889
  [ 9 ] Bug #470892 - CVE-2008-0017 Mozilla buffer overflow in http-index-format parser
        https://bugzilla.redhat.com/show_bug.cgi?id=470892
  [ 10 ] Bug #470894 - CVE-2008-5021 Mozilla crash and remote code execution in nsFrameManager
        https://bugzilla.redhat.com/show_bug.cgi?id=470894
  [ 11 ] Bug #470895 - CVE-2008-5022 Mozilla nsXMLHttpRequest::NotifyEventListeners() same-origin violation
        https://bugzilla.redhat.com/show_bug.cgi?id=470895
  [ 12 ] Bug #470898 - CVE-2008-5023 Mozilla -moz-binding property bypasses security checks on codebase principals
        https://bugzilla.redhat.com/show_bug.cgi?id=470898
  [ 13 ] Bug #470902 - CVE-2008-5024 Mozilla parsing error in E4X default namespace
        https://bugzilla.redhat.com/show_bug.cgi?id=470902
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update epiphany' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the Fedora-package-announce mailing list