SCIENTIFIC-LINUX-ERRATA Archives

October 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Connie Sieh <[log in to unmask]>
Reply To:
Connie Sieh <[log in to unmask]>
Date:
Mon, 15 Oct 2012 16:33:23 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (35 lines)
Synopsis:          Critical: xulrunner security update
Issue Date:        2012-10-12
CVE Numbers:       CVE-2012-4193
--

A flaw was found in the way XULRunner handled security wrappers. A web page
containing malicious content could possibly cause an application linked
against XULRunner (such as Mozilla Firefox) to execute arbitrary code with
the privileges of the user running the application. (CVE-2012-4193)

After installing the update, applications using XULRunner must be restarted for
the changes to take effect.
--

SL5
   x86_64
     xulrunner-10.0.8-2.el5_8.i386.rpm
     xulrunner-10.0.8-2.el5_8.x86_64.rpm
     xulrunner-devel-10.0.8-2.el5_8.i386.rpm
     xulrunner-devel-10.0.8-2.el5_8.x86_64.rpm
   i386
     xulrunner-10.0.8-2.el5_8.i386.rpm
     xulrunner-devel-10.0.8-2.el5_8.i386.rpm
SL6
   x86_64
     xulrunner-10.0.8-2.el6_3.i686.rpm
     xulrunner-10.0.8-2.el6_3.x86_64.rpm
     xulrunner-devel-10.0.8-2.el6_3.i686.rpm
     xulrunner-devel-10.0.8-2.el6_3.x86_64.rpm
   i386
     xulrunner-10.0.8-2.el6_3.i686.rpm
     xulrunner-devel-10.0.8-2.el6_3.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2