---------------------------------------------------------------------Fedora Update Notification
FEDORA-2007-552
2007-05-31
---------------------------------------------------------------------Product     : Fedora Core 5
Name        : epiphany
Version     : 2.14.3
Release     : 6.fc5
Summary     : GNOME web browser based on the Mozilla rendering engine
Description :
epiphany is a simple GNOME web browser based on the Mozilla rendering
engine

---------------------------------------------------------------------Update Information:

Updated seamonkey packages that fix several security bugs
are now available for Fedora Core 5.

This update has been rated as having critical security
impact by the Fedora Security Response Team.

SeaMonkey is an open source Web browser, advanced email and
newsgroup client, IRC chat client, and HTML editor.

Several flaws were found in the way SeaMonkey processed
certain malformed JavaScript code. A web page containing
malicious JavaScript code could cause SeaMonkey to crash or
potentially execute arbitrary code as the user running
SeaMonkey. (CVE-2007-2867, CVE-2007-2868)

A flaw was found in the way SeaMonkey handled certain FTP
PASV commands. A malicious FTP server could use this flaw to
perform a rudimentary port-scan of machines behind a user's
firewall. (CVE-2007-1562)

Several denial of service flaws were found in the way
SeaMonkey handled certain form and cookie data. A malicious
web site that is able to set arbitrary form and cookie data
could prevent SeaMonkey from functioning properly.
(CVE-2007-1362, CVE-2007-2869)

A flaw was found in the way SeaMonkey processed certain APOP
authentication requests. By sending certain responses when
SeaMonkey attempted to authenticate against an APOP server,
a remote attacker could potentially acquire certain portions
of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way SeaMonkey handled the
addEventListener JavaScript method. A malicious web site
could use this method to access or modify sensitive data
from another web site. (CVE-2007-2870)

A flaw was found in the way SeaMonkey displayed certain web
content. A malicious web page could generate content that
would overlay user interface elements such as the hostname
and security indicators, tricking users into thinking they
are visiting a different site. (CVE-2007-2871)

Users of SeaMonkey are advised to upgrade to these erratum
packages, which contain SeaMonkey version 1.0.9 that
corrects these issues. 



---------------------------------------------------------------------* Wed May 30 2007 Christopher Aillon  - 2.14.3-6
- Rebuild
* Wed May 30 2007 Christopher Aillon  - 2.14.3-5
- Rebuild against newer gecko
* Fri Feb 16 2007 Martin Stransky   - 2.14.3-4
- Rebuild against seamonkey
* Fri Dec 22 2006 Martin Stransky   - 2.14.3-3
- Rebuild against seamonkey
* Mon Nov 13 2006 Martin Stransky   - 2.14.3-2
- Rebuild against seamonkey
* Wed Aug  2 2006 Matthias Clasen   - 2.14.3-1.fc5
- Update to 2.14.3
* Mon May 29 2006 Matthias Clasen  - 2.14.2.1-1.fc5.1
- Update to 2.14.2.1
* Sun May 28 2006 Matthias Clasen  - 2.14.2-1.fc5.1
- Update to 2.14.2

---------------------------------------------------------------------This update can be downloaded from:
    
94e424f06c19e031e3109a8eb60e4b06a21150e1  SRPMS/epiphany-2.14.3-6.fc5.src.rpm
94e424f06c19e031e3109a8eb60e4b06a21150e1  noarch/epiphany-2.14.3-6.fc5.src.rpm
cb00b48656ebce8c804da1e435a15a2d0d07b6c8  ppc/epiphany-devel-2.14.3-6.fc5.ppc.rpm
3be5508ee511b4d3a76db1cb3cb9c65906fb178d  ppc/debug/epiphany-debuginfo-2.14.3-6.fc5.ppc.rpm
8f746eb98b829762540f84bfde2599673c78f244  ppc/epiphany-2.14.3-6.fc5.ppc.rpm
748204683e71dd180486e7a2e66fd2b780739aeb  x86_64/epiphany-2.14.3-6.fc5.x86_64.rpm
b5addc6b7fbc5cd7db3ffd3bc8eb2ce4efdc4ca1  x86_64/debug/epiphany-debuginfo-2.14.3-6.fc5.x86_64.rpm
fc517c37d0e8819689d09f24bc04e9e61c5fd144  x86_64/epiphany-devel-2.14.3-6.fc5.x86_64.rpm
e267e1f20bcbbece8041628eb3ac303ec4b64215  i386/epiphany-devel-2.14.3-6.fc5.i386.rpm
0f5b95ac2b08cc945b6efae6b815fdd2167bef6e  i386/epiphany-2.14.3-6.fc5.i386.rpm
c5479884c86dc5cbf5e4b55839f4b24a20714dda  i386/debug/epiphany-debuginfo-2.14.3-6.fc5.i386.rpm

This update can be installed with the 'yum' update program.  Use 'yum update
package-name' at the command line.  For more information, refer to 'Managing
Software with yum,' available at .
---------------------------------------------------------------------_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

Fedora Core 5 Update: epiphany-2.14.3-6.fc5

May 31, 2007
Updated seamonkey packages that fix several security bugs are now available for Fedora Core 5

Summary

epiphany is a simple GNOME web browser based on the Mozilla rendering

engine

Updated seamonkey packages that fix several security bugs

are now available for Fedora Core 5.

This update has been rated as having critical security

impact by the Fedora Security Response Team.

SeaMonkey is an open source Web browser, advanced email and

newsgroup client, IRC chat client, and HTML editor.

Several flaws were found in the way SeaMonkey processed

certain malformed JavaScript code. A web page containing

malicious JavaScript code could cause SeaMonkey to crash or

potentially execute arbitrary code as the user running

SeaMonkey. (CVE-2007-2867, CVE-2007-2868)

A flaw was found in the way SeaMonkey handled certain FTP

PASV commands. A malicious FTP server could use this flaw to

perform a rudimentary port-scan of machines behind a user's

firewall. (CVE-2007-1562)

Several denial of service flaws were found in the way

SeaMonkey handled certain form and cookie data. A malicious

web site that is able to set arbitrary form and cookie data

could prevent SeaMonkey from functioning properly.

(CVE-2007-1362, CVE-2007-2869)

A flaw was found in the way SeaMonkey processed certain APOP

authentication requests. By sending certain responses when

SeaMonkey attempted to authenticate against an APOP server,

a remote attacker could potentially acquire certain portions

of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way SeaMonkey handled the

addEventListener JavaScript method. A malicious web site

could use this method to access or modify sensitive data

from another web site. (CVE-2007-2870)

A flaw was found in the way SeaMonkey displayed certain web

content. A malicious web page could generate content that

would overlay user interface elements such as the hostname

and security indicators, tricking users into thinking they

are visiting a different site. (CVE-2007-2871)

Users of SeaMonkey are advised to upgrade to these erratum

packages, which contain SeaMonkey version 1.0.9 that

corrects these issues.

- Rebuild

* Wed May 30 2007 Christopher Aillon - 2.14.3-5

- Rebuild against newer gecko

* Fri Feb 16 2007 Martin Stransky - 2.14.3-4

- Rebuild against seamonkey

* Fri Dec 22 2006 Martin Stransky - 2.14.3-3

- Rebuild against seamonkey

* Mon Nov 13 2006 Martin Stransky - 2.14.3-2

- Rebuild against seamonkey

* Wed Aug 2 2006 Matthias Clasen - 2.14.3-1.fc5

- Update to 2.14.3

* Mon May 29 2006 Matthias Clasen - 2.14.2.1-1.fc5.1

- Update to 2.14.2.1

* Sun May 28 2006 Matthias Clasen - 2.14.2-1.fc5.1

- Update to 2.14.2

94e424f06c19e031e3109a8eb60e4b06a21150e1 SRPMS/epiphany-2.14.3-6.fc5.src.rpm

94e424f06c19e031e3109a8eb60e4b06a21150e1 noarch/epiphany-2.14.3-6.fc5.src.rpm

cb00b48656ebce8c804da1e435a15a2d0d07b6c8 ppc/epiphany-devel-2.14.3-6.fc5.ppc.rpm

3be5508ee511b4d3a76db1cb3cb9c65906fb178d ppc/debug/epiphany-debuginfo-2.14.3-6.fc5.ppc.rpm

8f746eb98b829762540f84bfde2599673c78f244 ppc/epiphany-2.14.3-6.fc5.ppc.rpm

748204683e71dd180486e7a2e66fd2b780739aeb x86_64/epiphany-2.14.3-6.fc5.x86_64.rpm

b5addc6b7fbc5cd7db3ffd3bc8eb2ce4efdc4ca1 x86_64/debug/epiphany-debuginfo-2.14.3-6.fc5.x86_64.rpm

fc517c37d0e8819689d09f24bc04e9e61c5fd144 x86_64/epiphany-devel-2.14.3-6.fc5.x86_64.rpm

e267e1f20bcbbece8041628eb3ac303ec4b64215 i386/epiphany-devel-2.14.3-6.fc5.i386.rpm

0f5b95ac2b08cc945b6efae6b815fdd2167bef6e i386/epiphany-2.14.3-6.fc5.i386.rpm

c5479884c86dc5cbf5e4b55839f4b24a20714dda i386/debug/epiphany-debuginfo-2.14.3-6.fc5.i386.rpm

This update can be installed with the 'yum' update program. Use 'yum update

package-name' at the command line. For more information, refer to 'Managing

Software with yum,' available at .

Fedora-package-announce mailing list

Fedora-package-announce@redhat.com

http://www.redhat.com/mailman/listinfo/fedora-package-announce

FEDORA-2007-552 2007-05-31 Name : epiphany Version : 2.14.3 Release : 6.fc5 Summary : GNOME web browser based on the Mozilla rendering engine Description : epiphany is a simple GNOME web browser based on the Mozilla rendering engine Updated seamonkey packages that fix several security bugs are now available for Fedora Core 5. This update has been rated as having critical security impact by the Fedora Security Response Team. SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the way SeaMonkey processed certain malformed JavaScript code. A web page containing malicious JavaScript code could cause SeaMonkey to crash or potentially execute arbitrary code as the user running SeaMonkey. (CVE-2007-2867, CVE-2007-2868) A flaw was found in the way SeaMonkey handled certain FTP PASV commands. A malicious FTP server could use this flaw to perform a rudimentary port-scan of machines behind a user's firewall. (CVE-2007-1562) Several denial of service flaws were found in the way SeaMonkey handled certain form and cookie data. A malicious web site that is able to set arbitrary form and cookie data could prevent SeaMonkey from functioning properly. (CVE-2007-1362, CVE-2007-2869) A flaw was found in the way SeaMonkey processed certain APOP authentication requests. By sending certain responses when SeaMonkey attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user's authentication credentials. (CVE-2007-1558) A flaw was found in the way SeaMonkey handled the addEventListener JavaScript method. A malicious web site could use this method to access or modify sensitive data from another web site. (CVE-2007-2870) A flaw was found in the way SeaMonkey displayed certain web content. A malicious web page could generate content that would overlay user interface elements such as the hostname and security indicators, tricking users into thinking they are visiting a different site. (CVE-2007-2871) Users of SeaMonkey are advised to upgrade to these erratum packages, which contain SeaMonkey version 1.0.9 that corrects these issues. - Rebuild * Wed May 30 2007 Christopher Aillon - 2.14.3-5 - Rebuild against newer gecko * Fri Feb 16 2007 Martin Stransky - 2.14.3-4 - Rebuild against seamonkey * Fri Dec 22 2006 Martin Stransky - 2.14.3-3 - Rebuild against seamonkey * Mon Nov 13 2006 Martin Stransky - 2.14.3-2 - Rebuild against seamonkey * Wed Aug 2 2006 Matthias Clasen - 2.14.3-1.fc5 - Update to 2.14.3 * Mon May 29 2006 Matthias Clasen - 2.14.2.1-1.fc5.1 - Update to 2.14.2.1 * Sun May 28 2006 Matthias Clasen - 2.14.2-1.fc5.1 - Update to 2.14.2 94e424f06c19e031e3109a8eb60e4b06a21150e1 SRPMS/epiphany-2.14.3-6.fc5.src.rpm 94e424f06c19e031e3109a8eb60e4b06a21150e1 noarch/epiphany-2.14.3-6.fc5.src.rpm cb00b48656ebce8c804da1e435a15a2d0d07b6c8 ppc/epiphany-devel-2.14.3-6.fc5.ppc.rpm 3be5508ee511b4d3a76db1cb3cb9c65906fb178d ppc/debug/epiphany-debuginfo-2.14.3-6.fc5.ppc.rpm 8f746eb98b829762540f84bfde2599673c78f244 ppc/epiphany-2.14.3-6.fc5.ppc.rpm 748204683e71dd180486e7a2e66fd2b780739aeb x86_64/epiphany-2.14.3-6.fc5.x86_64.rpm b5addc6b7fbc5cd7db3ffd3bc8eb2ce4efdc4ca1 x86_64/debug/epiphany-debuginfo-2.14.3-6.fc5.x86_64.rpm fc517c37d0e8819689d09f24bc04e9e61c5fd144 x86_64/epiphany-devel-2.14.3-6.fc5.x86_64.rpm e267e1f20bcbbece8041628eb3ac303ec4b64215 i386/epiphany-devel-2.14.3-6.fc5.i386.rpm 0f5b95ac2b08cc945b6efae6b815fdd2167bef6e i386/epiphany-2.14.3-6.fc5.i386.rpm c5479884c86dc5cbf5e4b55839f4b24a20714dda i386/debug/epiphany-debuginfo-2.14.3-6.fc5.i386.rpm This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at . Fedora-package-announce mailing list Fedora-package-announce@redhat.com http://www.redhat.com/mailman/listinfo/fedora-package-announce

Change Log

References

Update Instructions

Severity
Name : epiphany
Version : 2.14.3
Release : 6.fc5
Summary : GNOME web browser based on the Mozilla rendering engine

Related News