SCIENTIFIC-LINUX-ERRATA Archives

September 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Thu, 29 Sep 2011 10:42:25 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (40 lines)
Synopsis:    Critical: thunderbird security update
Issue Date:  2011-09-28
CVE Numbers: CVE-2011-2999
              CVE-2011-2998


Mozilla Thunderbird is a standalone mail and newsgroup client.

A flaw was found in the way Thunderbird handled frame objects with certain
names. An attacker could use this flaw to cause a plug-in to grant its
content access to another site or the local file system, violating the
same-origin policy. (CVE-2011-2999)

An integer underflow flaw was found in the way Thunderbird handled large
JavaScript regular expressions. An HTML mail message containing malicious
JavaScript could cause Thunderbird to access already freed memory, causing
Thunderbird to crash or, potentially, execute arbitrary code with the
privileges of the user running Thunderbird. (CVE-2011-2998)

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.

SL4:
   i386
      thunderbird-1.5.0.12-44.el4.i386.rpm
      thunderbird-debuginfo-1.5.0.12-44.el4.i386.rpm
   x86_64
      thunderbird-1.5.0.12-44.el4.x86_64.rpm
      thunderbird-debuginfo-1.5.0.12-44.el4.x86_64.rpm
SL5:
   i386
      thunderbird-2.0.0.24-26.el5_7.i386.rpm
      thunderbird-debuginfo-2.0.0.24-26.el5_7.i386.rpm
   x86_64
      thunderbird-2.0.0.24-26.el5_7.x86_64.rpm
      thunderbird-debuginfo-2.0.0.24-26.el5_7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2