SCIENTIFIC-LINUX-ERRATA Archives

June 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Bonnie King <[log in to unmask]>
Reply To:
Date:
Wed, 26 Jun 2013 00:55:58 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (78 lines)
Synopsis:          Critical: firefox security update
Advisory ID:       SLSA-2013:0981-1
Issue Date:        2013-06-25
CVE Numbers:       CVE-2013-1682
                   CVE-2013-1684
                   CVE-2013-1685
                   CVE-2013-1686
                   CVE-2013-1687
                   CVE-2013-1690
                   CVE-2013-1692
                   CVE-2013-1693
                   CVE-2013-1694
                   CVE-2013-1697
--

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2013-1682, CVE-2013-1684, CVE-2013-1685,
CVE-2013-1686, CVE-2013-1687, CVE-2013-1690)

It was found that Firefox allowed data to be sent in the body of
XMLHttpRequest (XHR) HEAD requests. In some cases this could allow
attackers to conduct Cross-Site Request Forgery (CSRF) attacks.
(CVE-2013-1692)

Timing differences in the way Firefox processed SVG image files could
allow an attacker to read data across domains, potentially leading to
information disclosure. (CVE-2013-1693)

Two flaws were found in the way Firefox implemented some of its internal
structures (called wrappers). An attacker could use these flaws to bypass
some restrictions placed on them. This could lead to unexpected behavior
or a potentially exploitable crash. (CVE-2013-1694, CVE-2013-1697)

0.7 ESR, which corrects these issues. After installing the update, Firefox
must be restarted for the changes to take effect.
--

SL5
  x86_64
    firefox-17.0.7-1.el5_9.i386.rpm
    firefox-17.0.7-1.el5_9.x86_64.rpm
    firefox-debuginfo-17.0.7-1.el5_9.i386.rpm
    firefox-debuginfo-17.0.7-1.el5_9.x86_64.rpm
    xulrunner-17.0.7-1.el5_9.i386.rpm
    xulrunner-17.0.7-1.el5_9.x86_64.rpm
    xulrunner-debuginfo-17.0.7-1.el5_9.i386.rpm
    xulrunner-debuginfo-17.0.7-1.el5_9.x86_64.rpm
    xulrunner-devel-17.0.7-1.el5_9.i386.rpm
    xulrunner-devel-17.0.7-1.el5_9.x86_64.rpm
  i386
    firefox-17.0.7-1.el5_9.i386.rpm
    firefox-debuginfo-17.0.7-1.el5_9.i386.rpm
    xulrunner-17.0.7-1.el5_9.i386.rpm
    xulrunner-debuginfo-17.0.7-1.el5_9.i386.rpm
    xulrunner-devel-17.0.7-1.el5_9.i386.rpm
SL6
  x86_64
    firefox-17.0.7-1.el6_4.i686.rpm
    firefox-17.0.7-1.el6_4.x86_64.rpm
    firefox-debuginfo-17.0.7-1.el6_4.i686.rpm
    firefox-debuginfo-17.0.7-1.el6_4.x86_64.rpm
    xulrunner-17.0.7-1.el6_4.i686.rpm
    xulrunner-17.0.7-1.el6_4.x86_64.rpm
    xulrunner-debuginfo-17.0.7-1.el6_4.i686.rpm
    xulrunner-debuginfo-17.0.7-1.el6_4.x86_64.rpm
    xulrunner-devel-17.0.7-1.el6_4.i686.rpm
    xulrunner-devel-17.0.7-1.el6_4.x86_64.rpm
  i386
    firefox-17.0.7-1.el6_4.i686.rpm
    firefox-debuginfo-17.0.7-1.el6_4.i686.rpm
    xulrunner-17.0.7-1.el6_4.i686.rpm
    xulrunner-debuginfo-17.0.7-1.el6_4.i686.rpm
    xulrunner-devel-17.0.7-1.el6_4.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2