SCIENTIFIC-LINUX-ERRATA Archives

April 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Patrick Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 25 Apr 2012 11:34:48 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (114 lines)
Synopsis:    Critical: firefox security update
Issue Date:  2012-04-24
CVE Numbers: CVE-2012-0467
             CVE-2012-0469
             CVE-2012-0470
             CVE-2012-0471
             CVE-2012-0472
             CVE-2012-0473
             CVE-2012-0474
             CVE-2012-0477
             CVE-2012-0478
             CVE-2011-3062
             CVE-2012-0479


Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

A flaw was found in Sanitiser for OpenType (OTS), used by Firefox to help
prevent potential exploits in malformed OpenType fonts. A web page
containing malicious content could cause Firefox to crash or, under certain
conditions, possibly execute arbitrary code with the privileges of the user
running Firefox. (CVE-2011-3062)

A web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2012-0467, CVE-2012-0468, CVE-2012-0469)

A web page containing a malicious Scalable Vector Graphics (SVG) image file
could cause Firefox to crash or, potentially, execute arbitrary code with
the privileges of the user running Firefox. (CVE-2012-0470)

A flaw was found in the way Firefox used its embedded Cairo library to
render certain fonts. A web page containing malicious content could cause
Firefox to crash or, under certain conditions, possibly execute arbitrary
code with the privileges of the user running Firefox. (CVE-2012-0472)

A flaw was found in the way Firefox rendered certain images using WebGL. A
web page containing malicious content could cause Firefox to crash or,
under certain conditions, possibly execute arbitrary code with the
privileges of the user running Firefox. (CVE-2012-0478)

A cross-site scripting (XSS) flaw was found in the way Firefox handled
certain multibyte character sets. A web page containing malicious content
could cause Firefox to run JavaScript code with the permissions of a
different website. (CVE-2012-0471)

A flaw was found in the way Firefox rendered certain graphics using WebGL.
A web page containing malicious content could cause Firefox to crash.
(CVE-2012-0473)

A flaw in Firefox allowed the address bar to display a different website
than the one the user was visiting. An attacker could use this flaw to
conceal a malicious URL, possibly tricking a user into believing they are
viewing a trusted site, or allowing scripts to be loaded from the
attacker's site, possibly leading to cross-site scripting (XSS) attacks.
(CVE-2012-0474)

A flaw was found in the way Firefox decoded the ISO-2022-KR and ISO-2022-CN
character sets. A web page containing malicious content could cause Firefox
to run JavaScript code with the permissions of a different website.
(CVE-2012-0477)

A flaw was found in the way Firefox handled RSS and Atom feeds. Invalid
RSS or Atom content loaded over HTTPS caused Firefox to display the
address of said content in the location bar, but not the content in the
main window. The previous content continued to be displayed. An attacker
could use this flaw to perform phishing attacks, or trick users into
thinking they are visiting the site reported by the location bar, when the
page is actually content controlled by an attacker. (CVE-2012-0479)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 10.0.4 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.

SL5:
  i386
     firefox-10.0.4-1.el5_8.i386.rpm
     firefox-debuginfo-10.0.4-1.el5_8.i386.rpm
     xulrunner-10.0.4-1.el5_8.i386.rpm
     xulrunner-debuginfo-10.0.4-1.el5_8.i386.rpm
     xulrunner-devel-10.0.4-1.el5_8.i386.rpm
  x86_64
     firefox-10.0.4-1.el5_8.i386.rpm
     firefox-10.0.4-1.el5_8.x86_64.rpm
     firefox-debuginfo-10.0.4-1.el5_8.i386.rpm
     firefox-debuginfo-10.0.4-1.el5_8.x86_64.rpm
     xulrunner-10.0.4-1.el5_8.i386.rpm
     xulrunner-10.0.4-1.el5_8.x86_64.rpm
     xulrunner-debuginfo-10.0.4-1.el5_8.i386.rpm
     xulrunner-debuginfo-10.0.4-1.el5_8.x86_64.rpm
     xulrunner-devel-10.0.4-1.el5_8.i386.rpm
     xulrunner-devel-10.0.4-1.el5_8.x86_64.rpm
SL6:
  i386
     firefox-10.0.4-1.el6_2.i686.rpm
     firefox-debuginfo-10.0.4-1.el6_2.i686.rpm
     xulrunner-10.0.4-1.el6_2.i686.rpm
     xulrunner-debuginfo-10.0.4-1.el6_2.i686.rpm
     xulrunner-devel-10.0.4-1.el6_2.i686.rpm
  x86_64
     firefox-10.0.4-1.el6_2.i686.rpm
     firefox-10.0.4-1.el6_2.x86_64.rpm
     firefox-debuginfo-10.0.4-1.el6_2.i686.rpm
     firefox-debuginfo-10.0.4-1.el6_2.x86_64.rpm
     xulrunner-10.0.4-1.el6_2.i686.rpm
     xulrunner-10.0.4-1.el6_2.x86_64.rpm
     xulrunner-debuginfo-10.0.4-1.el6_2.i686.rpm
     xulrunner-debuginfo-10.0.4-1.el6_2.x86_64.rpm
     xulrunner-devel-10.0.4-1.el6_2.i686.rpm
     xulrunner-devel-10.0.4-1.el6_2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2