SCIENTIFIC-LINUX-ERRATA Archives

December 2010

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Fri, 10 Dec 2010 16:14:21 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (78 lines)
Synopsis:	Critical: firefox security update
Issue date:	2010-12-09
CVE Names:	CVE-2010-3766 CVE-2010-3767 CVE-2010-3768
                   CVE-2010-3770 CVE-2010-3771 CVE-2010-3772
                   CVE-2010-3773 CVE-2010-3774 CVE-2010-3775
                   CVE-2010-3776 CVE-2010-3777

Several flaws were found in the processing of malformed web content. A 
web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user 
running Firefox. (CVE-2010-3766, CVE-2010-3767, CVE-2010-3772, 
CVE-2010-3776, CVE-2010-3777)

A flaw was found in the way Firefox handled malformed JavaScript. A 
website with an object containing malicious JavaScript could cause 
Firefox to execute that JavaScript with the privileges of the user 
running Firefox. (CVE-2010-3771)

This update adds support for the Sanitiser for OpenType (OTS) library to
Firefox. This library helps prevent potential exploits in malformed
OpenType fonts by verifying the font file prior to use. (CVE-2010-3768)

A flaw was found in the way Firefox loaded Java LiveConnect scripts.
Malicious web content could load a Java LiveConnect script in a way that
would result in the plug-in object having elevated privileges, allowing 
it to execute Java code with the privileges of the user running Firefox.
(CVE-2010-3775)

It was found that the fix for CVE-2010-0179 was incomplete when the 
Firebug add-on was used. If a user visited a website containing 
malicious JavaScript while the Firebug add-on was enabled, it could 
cause Firefox to execute arbitrary JavaScript with the privileges of the 
user running Firefox. (CVE-2010-3773)

A flaw was found in the way Firefox presented the location bar to users. 
A malicious website could trick a user into thinking they are visiting 
the site reported by the location bar, when the page is actually content
controlled by an attacker. (CVE-2010-3774)

A cross-site scripting (XSS) flaw was found in the Firefox x-mac-arabic,
x-mac-farsi, and x-mac-hebrew character encodings. Certain characters 
were converted to angle brackets when displayed. If server-side script 
filtering missed these cases, it could result in Firefox executing 
JavaScript code with the permissions of a different website. (CVE-2010-3770)

After installing the update, Firefox must be restarted for the changes 
to take effect.

SL 4.x

      SRPMS:
firefox-3.6.13-3.el4.src.rpm
      i386:
firefox-3.6.13-3.el4.i386.rpm
      x86_64:
firefox-3.6.13-3.el4.i386.rpm
firefox-3.6.13-3.el4.x86_64.rpm

SL 5.x

      SRPMS:
firefox-3.6.13-2.el5.src.rpm
xulrunner-1.9.2.13-3.el5.src.rpm
      i386:
firefox-3.6.13-2.el5.i386.rpm
xulrunner-1.9.2.13-3.el5.i386.rpm
xulrunner-devel-1.9.2.13-3.el5.i386.rpm
      x86_64:
firefox-3.6.13-2.el5.i386.rpm
firefox-3.6.13-2.el5.x86_64.rpm
xulrunner-1.9.2.13-3.el5.i386.rpm
xulrunner-1.9.2.13-3.el5.x86_64.rpm
xulrunner-devel-1.9.2.13-3.el5.i386.rpm
xulrunner-devel-1.9.2.13-3.el5.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2