TITLE: Fedora update for firefox SECUNIA ADVISORY ID: SA16965 VERIFY ADVISORY: http://secunia.com/advisories/16965/ CRITICAL: Extremely critical IMPACT: Security Bypass, Spoofing, Manipulation of data, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. For more information: SA16869 SA16911 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 85c2728183b838e6c09ce4728a20f233 SRPMS/firefox-1.0.7-1.1.fc3.src.rpm 30343391ad2e1a36945bbed41becd72e x86_64/firefox-1.0.7-1.1.fc3.x86_64.rpm ceabd83c7b403b674795b981c8e57506 x86_64/debug/firefox-debuginfo-1.0.7-1.1.fc3.x86_64.rpm 9836f31b20397c5d717b0a915456c362 i386/firefox-1.0.7-1.1.fc3.i386.rpm 3d9c472fc684a6285dd48781fab34281 i386/debug/firefox-debuginfo-1.0.7-1.1.fc3.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 3d34c9afd050102e342e54d18c938892 SRPMS/firefox-1.0.7-1.1.fc4.src.rpm 064d9b23b001d6e1e794914254ae60fe ppc/firefox-1.0.7-1.1.fc4.ppc.rpm 4469655cc945d0bd97743c42ba7326b1 ppc/debug/firefox-debuginfo-1.0.7-1.1.fc4.ppc.rpm 3a9cc318a771fa152e65368d43a4b5a0 x86_64/firefox-1.0.7-1.1.fc4.x86_64.rpm 2c3ee4f39f825a78d97420f120629f8e x86_64/debug/firefox-debuginfo-1.0.7-1.1.fc4.x86_64.rpm 61bfc913f93131be9d2754944a7afcfc i386/firefox-1.0.7-1.1.fc4.i386.rpm 5ab51918877bf51b3586ce35f7e01de7 i386/debug/firefox-debuginfo-1.0.7-1.1.fc4.i386.rpm OTHER REFERENCES: SA16869: http://secunia.com/advisories/16869/ SA16911: http://secunia.com/advisories/16911/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------