Date:         Mon, 26 Jul 2010 13:28:20 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Critical: seamonkey on SL3.x, SL4.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Critical: seamonkey security update
Issue date:	2010-07-23
CVE Names:	CVE-2010-2755

An invalid free flaw was found in SeaMonkey's plugin handler. Malicious 
web content could result in an invalid memory pointer being freed, 
causing SeaMonkey to crash or, potentially, execute arbitrary code with 
the privileges of the user running SeaMonkey. (CVE-2010-2755)

SeaMonkey must be restarted for the changes to take effect.

SL 3.0.x

      SRPMS:
seamonkey-1.0.9-0.58.el3.src.rpm
      i386:
seamonkey-1.0.9-0.58.el3.i386.rpm
seamonkey-chat-1.0.9-0.58.el3.i386.rpm
seamonkey-devel-1.0.9-0.58.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.58.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.58.el3.i386.rpm
seamonkey-mail-1.0.9-0.58.el3.i386.rpm
seamonkey-nspr-1.0.9-0.58.el3.i386.rpm
seamonkey-nspr-devel-1.0.9-0.58.el3.i386.rpm
seamonkey-nss-1.0.9-0.58.el3.i386.rpm
seamonkey-nss-devel-1.0.9-0.58.el3.i386.rpm
      x86_64:
seamonkey-1.0.9-0.58.el3.i386.rpm
seamonkey-1.0.9-0.58.el3.x86_64.rpm
seamonkey-chat-1.0.9-0.58.el3.i386.rpm
seamonkey-chat-1.0.9-0.58.el3.x86_64.rpm
seamonkey-devel-1.0.9-0.58.el3.x86_64.rpm
seamonkey-dom-inspector-1.0.9-0.58.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.58.el3.x86_64.rpm
seamonkey-js-debugger-1.0.9-0.58.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.58.el3.x86_64.rpm
seamonkey-mail-1.0.9-0.58.el3.i386.rpm
seamonkey-mail-1.0.9-0.58.el3.x86_64.rpm
seamonkey-nspr-1.0.9-0.58.el3.i386.rpm
seamonkey-nspr-1.0.9-0.58.el3.x86_64.rpm
seamonkey-nspr-devel-1.0.9-0.58.el3.x86_64.rpm
seamonkey-nss-1.0.9-0.58.el3.i386.rpm
seamonkey-nss-1.0.9-0.58.el3.x86_64.rpm
seamonkey-nss-devel-1.0.9-0.58.el3.x86_64.rpm

SL 4.x

      SRPMS:
seamonkey-1.0.9-61.el4.src.rpm
      i386:
seamonkey-1.0.9-61.el4.i386.rpm
seamonkey-chat-1.0.9-61.el4.i386.rpm
seamonkey-devel-1.0.9-61.el4.i386.rpm
seamonkey-dom-inspector-1.0.9-61.el4.i386.rpm
seamonkey-js-debugger-1.0.9-61.el4.i386.rpm
seamonkey-mail-1.0.9-61.el4.i386.rpm
      x86_64:
seamonkey-1.0.9-61.el4.i386.rpm
seamonkey-1.0.9-61.el4.x86_64.rpm
seamonkey-chat-1.0.9-61.el4.i386.rpm
seamonkey-chat-1.0.9-61.el4.x86_64.rpm
seamonkey-devel-1.0.9-61.el4.x86_64.rpm
seamonkey-dom-inspector-1.0.9-61.el4.i386.rpm
seamonkey-dom-inspector-1.0.9-61.el4.x86_64.rpm
seamonkey-js-debugger-1.0.9-61.el4.i386.rpm
seamonkey-js-debugger-1.0.9-61.el4.x86_64.rpm
seamonkey-mail-1.0.9-61.el4.i386.rpm
seamonkey-mail-1.0.9-61.el4.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2010-2755 Critical: seamonkey SL3.x, SL4.x i386/x86_64

Critical: seamonkey security update

Summary

causing SeaMonkey to crash or, potentially, execute arbitrary code withthe privileges of the user running SeaMonkey. (CVE-2010-2755)SeaMonkey must be restarted for the changes to take effect.SL 3.0.xSRPMS:seamonkey-1.0.9-0.58.el3.src.rpmi386:seamonkey-1.0.9-0.58.el3.i386.rpmseamonkey-chat-1.0.9-0.58.el3.i386.rpmseamonkey-devel-1.0.9-0.58.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.58.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.58.el3.i386.rpmseamonkey-mail-1.0.9-0.58.el3.i386.rpmseamonkey-nspr-1.0.9-0.58.el3.i386.rpmseamonkey-nspr-devel-1.0.9-0.58.el3.i386.rpmseamonkey-nss-1.0.9-0.58.el3.i386.rpmseamonkey-nss-devel-1.0.9-0.58.el3.i386.rpmx86_64:seamonkey-1.0.9-0.58.el3.i386.rpmseamonkey-1.0.9-0.58.el3.x86_64.rpmseamonkey-chat-1.0.9-0.58.el3.i386.rpmseamonkey-chat-1.0.9-0.58.el3.x86_64.rpmseamonkey-devel-1.0.9-0.58.el3.x86_64.rpmseamonkey-dom-inspector-1.0.9-0.58.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.58.el3.x86_64.rpmseamonkey-js-debugger-1.0.9-0.58.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.58.el3.x86_64.rpmseamonkey-mail-1.0.9-0.58.el3.i386.rpmseamonkey-mail-1.0.9-0.58.el3.x86_64.rpmseamonkey-nspr-1.0.9-0.58.el3.i386.rpmseamonkey-nspr-1.0.9-0.58.el3.x86_64.rpmseamonkey-nspr-devel-1.0.9-0.58.el3.x86_64.rpmseamonkey-nss-1.0.9-0.58.el3.i386.rpmseamonkey-nss-1.0.9-0.58.el3.x86_64.rpmseamonkey-nss-devel-1.0.9-0.58.el3.x86_64.rpm



Security Fixes

Severity
Issued Date: : 2010-07-23
CVE Names: CVE-2010-2755
An invalid free flaw was found in SeaMonkey's plugin handler. Malicious
web content could result in an invalid memory pointer being freed,

Related News