LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Fedora 9 Update: chmsee-1.0.1-8.fc9 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora Update to the new upstream Firefox 3.0.6 / XULRunner 1.9.0.6 fixing multiple security issues.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-1399
2009-02-06 04:16:47
--------------------------------------------------------------------------------

Name        : chmsee
Product     : Fedora 9
Version     : 1.0.1
Release     : 8.fc9
URL         : http://chmsee.gro.clinux.org/
Summary     : A Gtk+2 CHM document viewer
Description :
A gtk2 chm document viewer.

It uses chmlib to extract files. It uses gecko to display pages. It supports
displaying multilingual pages due to gecko. It features bookmarks and tabs.
The tabs could be used to jump inside the chm file conveniently. Its UI is
clean and handy, also is well localized. It is actively developed and
maintained. The author of chmsee is Jungle Ji and several other great people.

Hint
* Unlike other chm viewers, chmsee extracts files from chm file, and then read
and display them. The extracted files could be found in $HOME/.chmsee/bookshelf
directory. You can clean those files at any time and there is a special config
option for that.
* The bookmark is related to each file so not all bookmarks will be loaded,
only current file's.
* Try to remove $HOME/.chmsee if you encounter any problem after an upgrade.

--------------------------------------------------------------------------------
Update Information:

Update to the new upstream Firefox 3.0.6 / XULRunner 1.9.0.6 fixing multiple
security issues:  http://www.mozilla.org/security/known-
vulnerabilities/firefox30.html#firefox3.0.6    This update also contains new
builds of all applications depending on Gecko libraries, built against the new
version.    Note: after the updated packages are installed, Firefox must be
restarted for the update to take effect.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb  4 2009 Christopher Aillon  - 1.0.1-8
- Rebuild against newer gecko
* Wed Dec 17 2008 Christopher Aillon  - 1.0.1-7
- Rebuild against newer gecko
* Wed Nov 12 2008 Christopher Aillon  - 1.0.1-6
- Rebuild against newer gecko
* Wed Sep 24 2008 Christopher Aillon  - 1.0.1-5
- Rebuild against newer gecko
* Fri Jun 20 2008 Martin Stransky  - 1.0.1-4
- Rebuild against new xulrunner
* Sat May 17 2008 bbbush  - 1.0.1-3
- update to 1.0.1
- specify gecko-provider to "libxul", add nspr in patch to configure
- BR libgcrypt-devel instead of openssl-devel
* Fri Apr 25 2008 bbbush  - 1.0.0-2.37
- patch from Martin Stransky to fix crash on open files (rh#427622)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #483141 - CVE-2009-0353 Firefox javascript crashes with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=483141
  [ 2 ] Bug #483143 - CVE-2009-0355 Firefox local file stealing with SessionStore
        https://bugzilla.redhat.com/show_bug.cgi?id=483143
  [ 3 ] Bug #483145 - CVE-2009-0357 Firefox XMLHttpRequest allows reading HTTPOnly cookies
        https://bugzilla.redhat.com/show_bug.cgi?id=483145
  [ 4 ] Bug #483139 - CVE-2009-0352 Firefox layout crashes with evidence of memory corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=483139
  [ 5 ] Bug #483142 - CVE-2009-0354 Firefox XSS using a chrome XBL method and window.eval
        https://bugzilla.redhat.com/show_bug.cgi?id=483142
  [ 6 ] Bug #483144 - CVE-2009-0356 Firefox Chrome privilege escalation via local .desktop files
        https://bugzilla.redhat.com/show_bug.cgi?id=483144
  [ 7 ] Bug #483150 - CVE-2009-0358 Firefox directives to not cache pages ignored
        https://bugzilla.redhat.com/show_bug.cgi?id=483150
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update chmsee' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.