SCIENTIFIC-LINUX-ERRATA Archives

February 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Reply To:
Date:
Wed, 1 Feb 2012 14:00:29 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (95 lines)
Synopsis:    Critical: firefox security update
Issue Date:  2012-01-31
CVE Numbers: CVE-2012-0442
             CVE-2011-3670
             CVE-2012-0449
             CVE-2012-0444
             CVE-2011-3659


Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

A use-after-free flaw was found in the way Firefox removed nsDOMAttribute
child nodes. In certain circumstances, due to the premature notification
of AttributeChildRemoved, a malicious script could possibly use this flaw
to cause Firefox to crash or, potentially, execute arbitrary code with the
privileges of the user running Firefox. (CVE-2011-3659)

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2012-0442)

A flaw was found in the way Firefox parsed Ogg Vorbis media files. A web
page containing a malicious Ogg Vorbis media file could cause Firefox to
crash or, potentially, execute arbitrary code with the privileges of the
user running Firefox. (CVE-2012-0444)

A flaw was found in the way Firefox parsed certain Scalable Vector Graphics
(SVG) image files that contained eXtensible Style Sheet Language
Transformations (XSLT). A web page containing a malicious SVG image file
could cause Firefox to crash or, potentially, execute arbitrary code with
the privileges of the user running Firefox. (CVE-2012-0449)

The same-origin policy in Firefox treated http://example.com and
http://[example.com] as interchangeable. A malicious script could possibly
use this flaw to gain access to sensitive information (such as a client's
IP and user e-mail address, or httpOnly cookies) that may be included in
HTTP proxy error replies, generated in response to invalid URLs using
square brackets. (CVE-2011-3670)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.6.26. You can find a link to the Mozilla
advisories in the References section of this erratum.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.6.26, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

SL4:
  i386
     firefox-3.6.26-2.el4.i386.rpm
     firefox-debuginfo-3.6.26-2.el4.i386.rpm
  x86_64
     firefox-3.6.26-2.el4.x86_64.rpm
     firefox-debuginfo-3.6.26-2.el4.x86_64.rpm
SL5:
  i386
     firefox-3.6.26-1.el5_7.i386.rpm
     firefox-debuginfo-3.6.26-1.el5_7.i386.rpm
     xulrunner-1.9.2.26-1.el5_7.i386.rpm
     xulrunner-debuginfo-1.9.2.26-1.el5_7.i386.rpm
     xulrunner-devel-1.9.2.26-1.el5_7.i386.rpm
  x86_64
     firefox-3.6.26-1.el5_7.i386.rpm
     firefox-3.6.26-1.el5_7.x86_64.rpm
     firefox-debuginfo-3.6.26-1.el5_7.i386.rpm
     firefox-debuginfo-3.6.26-1.el5_7.x86_64.rpm
     xulrunner-1.9.2.26-1.el5_7.i386.rpm
     xulrunner-1.9.2.26-1.el5_7.x86_64.rpm
     xulrunner-debuginfo-1.9.2.26-1.el5_7.i386.rpm
     xulrunner-debuginfo-1.9.2.26-1.el5_7.x86_64.rpm
     xulrunner-devel-1.9.2.26-1.el5_7.i386.rpm
     xulrunner-devel-1.9.2.26-1.el5_7.x86_64.rpm
SL6:
  i386
     firefox-3.6.26-1.el6_2.i686.rpm
     firefox-debuginfo-3.6.26-1.el6_2.i686.rpm
     xulrunner-1.9.2.26-1.el6_2.i686.rpm
     xulrunner-debuginfo-1.9.2.26-1.el6_2.i686.rpm
     xulrunner-devel-1.9.2.26-1.el6_2.i686.rpm
  x86_64
     firefox-3.6.26-1.el6_2.i686.rpm
     firefox-3.6.26-1.el6_2.x86_64.rpm
     firefox-debuginfo-3.6.26-1.el6_2.i686.rpm
     firefox-debuginfo-3.6.26-1.el6_2.x86_64.rpm
     xulrunner-1.9.2.26-1.el6_2.i686.rpm
     xulrunner-1.9.2.26-1.el6_2.x86_64.rpm
     xulrunner-debuginfo-1.9.2.26-1.el6_2.i686.rpm
     xulrunner-debuginfo-1.9.2.26-1.el6_2.x86_64.rpm
     xulrunner-devel-1.9.2.26-1.el6_2.i686.rpm
     xulrunner-devel-1.9.2.26-1.el6_2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2