Date:         Tue, 30 Mar 2010 13:56:34 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      FASTBUGS for SL 5.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

The following FASTBUGS have been uploaded to



         i386:
strace-4.5.18-5.el5_4.4.i386.rpm
        x86_64:
kmod-kvm-83-105.el5_4.28.x86_64.rpm
kvm-83-105.el5_4.28.x86_64.rpm
kvm-qemu-img-83-105.el5_4.28.x86_64.rpm
kvm-tools-83-105.el5_4.28.x86_64.rpm
strace-4.5.18-5.el5_4.4.x86_64.rpm

-Connie Sieh
-Troy Dawson
Date:         Wed, 31 Mar 2010 16:57:23 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Critical: seamonkey on SL3.x, SL4.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Critical: seamonkey security update
Issue date:	2010-03-30
CVE Names:	CVE-2010-0174 CVE-2010-0175 CVE-2010-0176
                   CVE-2010-0177

Several use-after-free flaws were found in SeaMonkey. Visiting a web 
page containing malicious content could result in SeaMonkey executing 
arbitrary code with the privileges of the user running SeaMonkey. 
(CVE-2010-0175, CVE-2010-0176, CVE-2010-0177)

Several flaws were found in the processing of malformed web content. A 
web page containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code with the privileges of the user 
running SeaMonkey. (CVE-2010-0174)

After installing the update, SeaMonkey must be restarted for the changes 
to take effect.

SL 3.0.x

      SRPMS:
seamonkey-1.0.9-0.52.el3.src.rpm
      i386:
seamonkey-1.0.9-0.52.el3.i386.rpm
seamonkey-chat-1.0.9-0.52.el3.i386.rpm
seamonkey-devel-1.0.9-0.52.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.52.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.52.el3.i386.rpm
seamonkey-mail-1.0.9-0.52.el3.i386.rpm
seamonkey-nspr-1.0.9-0.52.el3.i386.rpm
seamonkey-nspr-devel-1.0.9-0.52.el3.i386.rpm
seamonkey-nss-1.0.9-0.52.el3.i386.rpm
seamonkey-nss-devel-1.0.9-0.52.el3.i386.rpm
      x86_64:
seamonkey-1.0.9-0.52.el3.i386.rpm
seamonkey-1.0.9-0.52.el3.x86_64.rpm
seamonkey-chat-1.0.9-0.52.el3.i386.rpm
seamonkey-chat-1.0.9-0.52.el3.x86_64.rpm
seamonkey-devel-1.0.9-0.52.el3.x86_64.rpm
seamonkey-dom-inspector-1.0.9-0.52.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.52.el3.x86_64.rpm
seamonkey-js-debugger-1.0.9-0.52.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.52.el3.x86_64.rpm
seamonkey-mail-1.0.9-0.52.el3.i386.rpm
seamonkey-mail-1.0.9-0.52.el3.x86_64.rpm
seamonkey-nspr-1.0.9-0.52.el3.i386.rpm
seamonkey-nspr-1.0.9-0.52.el3.x86_64.rpm
seamonkey-nspr-devel-1.0.9-0.52.el3.x86_64.rpm
seamonkey-nss-1.0.9-0.52.el3.i386.rpm
seamonkey-nss-1.0.9-0.52.el3.x86_64.rpm
seamonkey-nss-devel-1.0.9-0.52.el3.x86_64.rpm

SL 4.x

      SRPMS:
seamonkey-1.0.9-54.el4_8.src.rpm
      i386:
seamonkey-1.0.9-54.el4_8.i386.rpm
seamonkey-chat-1.0.9-54.el4_8.i386.rpm
seamonkey-devel-1.0.9-54.el4_8.i386.rpm
seamonkey-dom-inspector-1.0.9-54.el4_8.i386.rpm
seamonkey-js-debugger-1.0.9-54.el4_8.i386.rpm
seamonkey-mail-1.0.9-54.el4_8.i386.rpm
      x86_64:
seamonkey-1.0.9-54.el4_8.x86_64.rpm
seamonkey-chat-1.0.9-54.el4_8.x86_64.rpm
seamonkey-devel-1.0.9-54.el4_8.x86_64.rpm
seamonkey-dom-inspector-1.0.9-54.el4_8.x86_64.rpm
seamonkey-js-debugger-1.0.9-54.el4_8.x86_64.rpm
seamonkey-mail-1.0.9-54.el4_8.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2010-0174 Critical: seamonkey SL3.x, SL4.x i386/x86_64

Critical: seamonkey security update

Summary

page containing malicious content could result in SeaMonkey executingarbitrary code with the privileges of the user running SeaMonkey.(CVE-2010-0175, CVE-2010-0176, CVE-2010-0177)Several flaws were found in the processing of malformed web content. Aweb page containing malicious content could cause SeaMonkey to crash or,potentially, execute arbitrary code with the privileges of the userrunning SeaMonkey. (CVE-2010-0174)After installing the update, SeaMonkey must be restarted for the changesto take effect.SL 3.0.xSRPMS:seamonkey-1.0.9-0.52.el3.src.rpmi386:seamonkey-1.0.9-0.52.el3.i386.rpmseamonkey-chat-1.0.9-0.52.el3.i386.rpmseamonkey-devel-1.0.9-0.52.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.52.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.52.el3.i386.rpmseamonkey-mail-1.0.9-0.52.el3.i386.rpmseamonkey-nspr-1.0.9-0.52.el3.i386.rpmseamonkey-nspr-devel-1.0.9-0.52.el3.i386.rpmseamonkey-nss-1.0.9-0.52.el3.i386.rpmseamonkey-nss-devel-1.0.9-0.52.el3.i386.rpmx86_64:seamonkey-1.0.9-0.52.el3.i386.rpmseamonkey-1.0.9-0.52.el3.x86_64.rpmseamonkey-chat-1.0.9-0.52.el3.i386.rpmseamonkey-chat-1.0.9-0.52.el3.x86_64.rpmseamonkey-devel-1.0.9-0.52.el3.x86_64.rpmseamonkey-dom-inspector-1.0.9-0.52.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.52.el3.x86_64.rpmseamonkey-js-debugger-1.0.9-0.52.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.52.el3.x86_64.rpmseamonkey-mail-1.0.9-0.52.el3.i386.rpmseamonkey-mail-1.0.9-0.52.el3.x86_64.rpmseamonkey-nspr-1.0.9-0.52.el3.i386.rpmseamonkey-nspr-1.0.9-0.52.el3.x86_64.rpmseamonkey-nspr-devel-1.0.9-0.52.el3.x86_64.rpmseamonkey-nss-1.0.9-0.52.el3.i386.rpmseamonkey-nss-1.0.9-0.52.el3.x86_64.rpmseamonkey-nss-devel-1.0.9-0.52.el3.x86_64.rpm



Security Fixes

Severity
Issued Date: : 2010-03-30
CVE Names: CVE-2010-0174 CVE-2010-0175 CVE-2010-0176
CVE-2010-0177
Several use-after-free flaws were found in SeaMonkey. Visiting a web

Related News