SCIENTIFIC-LINUX-ERRATA Archives

March 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Patrick Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 21 Mar 2012 16:24:39 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (104 lines)
Synopsis:    Critical: firefox security and bug fix update
Issue Date:  2012-03-14
CVE Numbers: CVE-2012-0461
             CVE-2012-0460
             CVE-2012-0459
             CVE-2012-0458
             CVE-2012-0451
             CVE-2012-0456
             CVE-2012-0455


Mozilla Firefox is an open source web browser.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464)

Two flaws were found in the way Firefox parsed certain Scalable Vector
Graphics (SVG) image files. A web page containing a malicious SVG image
file could cause an information leak, or cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2012-0456, CVE-2012-0457)

A flaw could allow a malicious site to bypass intended restrictions,
possibly leading to a cross-site scripting (XSS) attack if a user were
tricked into dropping a "javascript:" link onto a frame. (CVE-2012-0455)

It was found that the home page could be set to a "javascript:" link. If a
user were tricked into setting such a home page by dragging a link to the
home button, it could cause Firefox to repeatedly crash, eventually
leading to arbitrary code execution with the privileges of the user
running Firefox. (CVE-2012-0458)

A flaw was found in the way Firefox parsed certain web content containing
"cssText". A web page containing malicious content could cause Firefox to
crash or, potentially, execute arbitrary code with the privileges of the
user running Firefox. (CVE-2012-0459)

It was found that by using the DOM fullscreen API, untrusted content could
bypass the mozRequestFullscreen security protections. A web page containing
malicious web content could exploit this API flaw to cause user interface
spoofing. (CVE-2012-0460)

A flaw was found in the way Firefox handled pages with multiple Content
Security Policy (CSP) headers. This could lead to a cross-site scripting
attack if used in conjunction with a website that has a header injection
flaw. (CVE-2012-0451)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 10.0.3 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.

This update also fixes the following bugs:

* When using the Traditional Chinese locale (zh-TW), a segmentation fault
sometimes occurred when closing Firefox. 

* Inputting any text in the Web Console (Tools -> Web Developer ->
Web Console) caused Firefox to crash.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 10.0.3 ESR, which corrects these issues. After installing
the update, Firefox must be restarted for the changes to take effect.

SL5:
  i386
     firefox-10.0.3-1.el5_8.i386.rpm
     firefox-debuginfo-10.0.3-1.el5_8.i386.rpm
     xulrunner-10.0.3-1.el5_8.i386.rpm
     xulrunner-debuginfo-10.0.3-1.el5_8.i386.rpm
     xulrunner-devel-10.0.3-1.el5_8.i386.rpm
  x86_64
     firefox-10.0.3-1.el5_8.i386.rpm
     firefox-10.0.3-1.el5_8.x86_64.rpm
     firefox-debuginfo-10.0.3-1.el5_8.i386.rpm
     firefox-debuginfo-10.0.3-1.el5_8.x86_64.rpm
     xulrunner-10.0.3-1.el5_8.i386.rpm
     xulrunner-10.0.3-1.el5_8.x86_64.rpm
     xulrunner-debuginfo-10.0.3-1.el5_8.i386.rpm
     xulrunner-debuginfo-10.0.3-1.el5_8.x86_64.rpm
     xulrunner-devel-10.0.3-1.el5_8.i386.rpm
     xulrunner-devel-10.0.3-1.el5_8.x86_64.rpm
SL6:
  i386
     firefox-10.0.3-1.el6_2.i686.rpm
     firefox-debuginfo-10.0.3-1.el6_2.i686.rpm
     xulrunner-10.0.3-1.el6_2.i686.rpm
     xulrunner-debuginfo-10.0.3-1.el6_2.i686.rpm
     xulrunner-devel-10.0.3-1.el6_2.i686.rpm
  x86_64
     firefox-10.0.3-1.el6_2.i686.rpm
     firefox-10.0.3-1.el6_2.x86_64.rpm
     firefox-debuginfo-10.0.3-1.el6_2.i686.rpm
     firefox-debuginfo-10.0.3-1.el6_2.x86_64.rpm
     xulrunner-10.0.3-1.el6_2.i686.rpm
     xulrunner-10.0.3-1.el6_2.x86_64.rpm
     xulrunner-debuginfo-10.0.3-1.el6_2.i686.rpm
     xulrunner-debuginfo-10.0.3-1.el6_2.x86_64.rpm
     xulrunner-devel-10.0.3-1.el6_2.i686.rpm
     xulrunner-devel-10.0.3-1.el6_2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2