SCIENTIFIC-LINUX-ERRATA Archives

March 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Fri, 4 Mar 2011 15:11:13 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (58 lines)
Synopsis:	Critical: firefox security update
Issue date:	2010-11-10
CVE Names:	CVE-2010-3175 CVE-2010-3176 CVE-2010-3177
                   CVE-2010-3178 CVE-2010-3179 CVE-2010-3180
                   CVE-2010-3182 CVE-2010-3183 CVE-2010-3765

A race condition flaw was found in the way Firefox handled Document 
Object Model (DOM) element properties. Malicious HTML content could 
cause Firefox to crash or, potentially, execute arbitrary code with the 
privileges of the user running Firefox. (CVE-2010-3765)

Several flaws were found in the processing of malformed web content. A 
web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user 
running Firefox. (CVE-2010-3175, CVE-2010-3176, CVE-2010-3179, 
CVE-2010-3183, CVE-2010-3180)

A flaw was found in the way the Gopher parser in Firefox converted text
into HTML. A malformed file name on a Gopher server could, when accessed 
by a victim running Firefox, allow arbitrary JavaScript to be executed 
in the context of the Gopher domain. (CVE-2010-3177)

A same-origin policy bypass flaw was found in Firefox. An attacker could
create a malicious web page that, when viewed by a victim, could steal
private data from a different website the victim had loaded with 
Firefox. (CVE-2010-3178)

A flaw was found in the script that launches Firefox. The 
LD_LIBRARY_PATH variable was appending a "." character, which could 
allow a local attacker to execute arbitrary code with the privileges of 
a different user running Firefox, if that user ran Firefox from within 
an attacker-controlled directory. (CVE-2010-3182)

For technical details regarding these flaws, refer to the Mozilla 
security advisories for Firefox 3.6.11 and 3.6.12.

After installing the update, Firefox must be restarted for the changes 
to take effect.

SL 6.x

      SRPMS:
firefox-3.6.12-1.el6_0.src.rpm
xulrunner-1.9.2.12-1.el6_0.src.rpm
      i386:
firefox-3.6.12-1.el6_0.i686.rpm
xulrunner-1.9.2.12-1.el6_0.i686.rpm
xulrunner-devel-1.9.2.12-1.el6_0.i686.rpm
      x86_64:
firefox-3.6.12-1.el6_0.x86_64.rpm
xulrunner-1.9.2.12-1.el6_0.i686.rpm
xulrunner-1.9.2.12-1.el6_0.x86_64.rpm
xulrunner-devel-1.9.2.12-1.el6_0.i686.rpm
xulrunner-devel-1.9.2.12-1.el6_0.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2