To: [email protected]Subject: [ MDKSA-2006:075 ] - Updated mozilla-firefox packages fix numerous vulnerabilities
Date: Mon, 24 Apr 2006 20:56:39 -0600
From: [email protected]
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1FYDjD-0001wV-Hi@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:075
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mozilla-firefox
Date : April 24, 2006
Affected: 2006.0
_______________________________________________________________________
Problem Description:
A number of vulnerabilities have been discovered in the Mozilla Firefox
browser that could allow a remote attacker to craft malicious web pages
that could take advantage of these issues to execute arbitrary code
with elevated privileges, spoof content, and steal local files,
cookies, or other information from web pages. As well, some of these
vulnerabilities can be exploited to execute arbitrary code with the
privileges of the user running the browser.
As well, two crasher bugs have been fixed as well.
The updated packages have been patched to fix these problems.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790
https://bugzilla.mozilla.org/show_bug.cgi?id=275896
https://bugzilla.mozilla.org/show_bug.cgi?id=330900
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
3780668e99350fecb7e1da24330b7bed 2006.0/RPMS/libnspr4-1.0.6-16.5.20060mdk.i586.rpm
e322c361441c540c473c17be628c56c5 2006.0/RPMS/libnspr4-devel-1.0.6-16.5.20060mdk.i586.rpm
5e7771258e4019de67912afd88201043 2006.0/RPMS/libnss3-1.0.6-16.5.20060mdk.i586.rpm
3b8d26864055478f01723e33a2dd060a 2006.0/RPMS/libnss3-devel-1.0.6-16.5.20060mdk.i586.rpm
9a5e293de59e94a574f596215c06d7a1 2006.0/RPMS/mozilla-firefox-1.0.6-16.5.20060mdk.i586.rpm
40de607b8c6fb7a9fcbe09cf194fa306 2006.0/RPMS/mozilla-firefox-devel-1.0.6-16.5.20060mdk.i586.rpm
70205ca1a829e0be5f571376c492dc93 2006.0/SRPMS/mozilla-firefox-1.0.6-16.5.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
bb30c3560134a888a041faa548e80a93 x86_64/2006.0/RPMS/lib64nspr4-1.0.6-16.5.20060mdk.x86_64.rpm
30e61853b74326055712d1021f15cec8 x86_64/2006.0/RPMS/lib64nspr4-devel-1.0.6-16.5.20060mdk.x86_64.rpm
271a6b04c6dbbc4e5eb814dd3c682801 x86_64/2006.0/RPMS/lib64nss3-1.0.6-16.5.20060mdk.x86_64.rpm
25c9a54f6f77823d37da854e55bac42d x86_64/2006.0/RPMS/lib64nss3-devel-1.0.6-16.5.20060mdk.x86_64.rpm
70f565e72131379186f742049453158c x86_64/2006.0/RPMS/mozilla-firefox-1.0.6-16.5.20060mdk.x86_64.rpm
6ca25ff70f4fb687bcce8d295b4e7a71 x86_64/2006.0/RPMS/mozilla-firefox-devel-1.0.6-16.5.20060mdk.x86_64.rpm
70205ca1a829e0be5f571376c492dc93 x86_64/2006.0/SRPMS/mozilla-firefox-1.0.6-16.5.20060mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFETUw0mqjQ0CJFipgRAo/QAJ4qvjL82JiWa5Sttl3vh/mf8wFIkACff65l
c1jhuFefopIrhLAGO8poHA4=
=tQnr
-----END PGP SIGNATURE-----