Summary: | www-client/mozilla-firefox(-bin) Dialog Spoofing Vulnerability (CVE-2008-0367) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Lars Hartmann <lars> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0367 | ||
See Also: | https://bugzilla.mozilla.org/show_bug.cgi?id=244273 | ||
Whiteboard: | B4 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Lars Hartmann
2008-01-24 08:43:03 UTC
Any news on this one? Fixed in firefox3 In 2.x, too, I guess? Nothing for mozilla to do here. Fixed as per https://bugzilla.mozilla.org/show_bug.cgi?id=244273 This issue was resolved and addressed in GLSA 201301-01 at http://security.gentoo.org/glsa/glsa-201301-01.xml by GLSA coordinator Sean Amoss (ackle). |