SCIENTIFIC-LINUX-ERRATA Archives

October 2010

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Wed, 20 Oct 2010 13:32:33 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (99 lines)
Synopsis:	Critical: firefox security update
Issue date:	2010-10-19
CVE Names:	CVE-2010-3170 CVE-2010-3173 CVE-2010-3175
                   CVE-2010-3176 CVE-2010-3177 CVE-2010-3178
                   CVE-2010-3179 CVE-2010-3180 CVE-2010-3182
                   CVE-2010-3183

Several flaws were found in the processing of malformed web content. A 
web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user 
running Firefox. (CVE-2010-3175, CVE-2010-3176, CVE-2010-3179, 
CVE-2010-3183, CVE-2010-3180)

A flaw was found in the way the Gopher parser in Firefox converted text
into HTML. A malformed file name on a Gopher server could, when accessed 
by a victim running Firefox, allow arbitrary JavaScript to be executed 
in the context of the Gopher domain. (CVE-2010-3177)

A same-origin policy bypass flaw was found in Firefox. An attacker could
create a malicious web page that, when viewed by a victim, could steal
private data from a different website the victim has loaded with 
Firefox. (CVE-2010-3178)

A flaw was found in the script that launches Firefox. The 
LD_LIBRARY_PATH variable was appending a "." character, which could 
allow a local attacker to execute arbitrary code with the privileges of 
a different user running Firefox, if that user ran Firefox from within 
an attacker-controlled directory. (CVE-2010-3182)

This update also provides NSS version 3.12.8 which is required by the
updated Firefox version, fixing the following security issues:

It was found that the SSL DHE (Diffie-Hellman Ephemeral) mode
implementation for key exchanges in Firefox accepted DHE keys that were 
256 bits in length. This update removes support for 256 bit DHE keys, as 
such keys are easily broken using modern hardware. (CVE-2010-3173)

A flaw was found in the way NSS matched SSL certificates when the
certificates had a Common Name containing a wildcard and a partial IP
address. NSS incorrectly accepted connections to IP addresses that fell
within the SSL certificate's wildcard range as valid SSL connections,
possibly allowing an attacker to conduct a man-in-the-middle attack.
(CVE-2010-3170)


After installing the update, Firefox must be restarted for the changes 
to take effect.


SL 4.x

      SRPMS:
firefox-3.6.11-2.el4.src.rpm
nss-3.12.8-1.el4.src.rpm
      i386:
firefox-3.6.11-2.el4.i386.rpm
nss-3.12.8-1.el4.i386.rpm
nss-devel-3.12.8-1.el4.i386.rpm
nss-tools-3.12.8-1.el4.i386.rpm
      x86_64:
firefox-3.6.11-2.el4.i386.rpm
firefox-3.6.11-2.el4.x86_64.rpm
nss-3.12.8-1.el4.i386.rpm
nss-3.12.8-1.el4.x86_64.rpm
nss-devel-3.12.8-1.el4.x86_64.rpm
nss-tools-3.12.8-1.el4.x86_64.rpm

SL 5.x

      SRPMS:
firefox-3.6.11-2.el5.src.rpm
nss-3.12.8-1.el5.src.rpm
xulrunner-1.9.2.11-2.el5.src.rpm
      i386:
firefox-3.6.11-2.el5.i386.rpm
nss-3.12.8-1.el5.i386.rpm
nss-devel-3.12.8-1.el5.i386.rpm
nss-pkcs11-devel-3.12.8-1.el5.i386.rpm
nss-tools-3.12.8-1.el5.i386.rpm
xulrunner-1.9.2.11-2.el5.i386.rpm
xulrunner-devel-1.9.2.11-2.el5.i386.rpm
      x86_64:
firefox-3.6.11-2.el5.i386.rpm
firefox-3.6.11-2.el5.x86_64.rpm
nss-3.12.8-1.el5.i386.rpm
nss-3.12.8-1.el5.x86_64.rpm
nss-devel-3.12.8-1.el5.i386.rpm
nss-devel-3.12.8-1.el5.x86_64.rpm
nss-pkcs11-devel-3.12.8-1.el5.i386.rpm
nss-pkcs11-devel-3.12.8-1.el5.x86_64.rpm
nss-tools-3.12.8-1.el5.x86_64.rpm
xulrunner-1.9.2.11-2.el5.i386.rpm
xulrunner-1.9.2.11-2.el5.x86_64.rpm
xulrunner-devel-1.9.2.11-2.el5.i386.rpm
xulrunner-devel-1.9.2.11-2.el5.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2