Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Critical: firefox on SL5.x, SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Thursday 10th January 2013 16:02:22 UTC (over 3 years ago)
Synopsis:          Critical: firefox security update
Issue Date:        2013-01-08
CVE Numbers:       CVE-2013-0769
                    CVE-2013-0762
                    CVE-2013-0766
                    CVE-2013-0767
                    CVE-2013-0759
                    CVE-2013-0744
                    CVE-2013-0746
                    CVE-2013-0748
                    CVE-2013-0750
                    CVE-2013-0758
                    CVE-2013-0753
                    CVE-2013-0754
--

Several flaws were found in the processing of malformed web content. A 
web page
containing malicious content could cause Firefox to crash or, potentially,
execute arbitrary code with the privileges of the user running Firefox.
(CVE-2013-0744, CVE-2013-0746, CVE-2013-0750, CVE-2013-0753, CVE-2013-0754,
CVE-2013-0762, CVE-2013-0766, CVE-2013-0767, CVE-2013-0769)

A flaw was found in the way Chrome Object Wrappers were implemented. 
Malicious
content could be used to cause Firefox to execute arbitrary code via 
plug-ins
installed in Firefox. (CVE-2013-0758)

A flaw in the way Firefox displayed URL values in the address bar could 
allow a
malicious site or user to perform a phishing attack. (CVE-2013-0759)

An information disclosure flaw was found in the way certain JavaScript
functions were implemented in Firefox. An attacker could use this flaw to
bypass Address Space Layout Randomization (ASLR) and other security
restrictions. (CVE-2013-0748)

After installing the update, Firefox must be restarted for the changes to
take effect.
--

SL5
   x86_64
     firefox-10.0.12-1.el5_9.i386.rpm
     firefox-10.0.12-1.el5_9.x86_64.rpm
     firefox-debuginfo-10.0.12-1.el5_9.i386.rpm
     firefox-debuginfo-10.0.12-1.el5_9.x86_64.rpm
     xulrunner-10.0.12-1.el5_9.i386.rpm
     xulrunner-10.0.12-1.el5_9.x86_64.rpm
     xulrunner-debuginfo-10.0.12-1.el5_9.i386.rpm
     xulrunner-debuginfo-10.0.12-1.el5_9.x86_64.rpm
     xulrunner-devel-10.0.12-1.el5_9.i386.rpm
     xulrunner-devel-10.0.12-1.el5_9.x86_64.rpm
   i386
     firefox-10.0.12-1.el5_9.i386.rpm
     firefox-debuginfo-10.0.12-1.el5_9.i386.rpm
     xulrunner-10.0.12-1.el5_9.i386.rpm
     xulrunner-debuginfo-10.0.12-1.el5_9.i386.rpm
     xulrunner-devel-10.0.12-1.el5_9.i386.rpm
SL6
   x86_64
     firefox-10.0.12-1.el6_3.i686.rpm
     firefox-10.0.12-1.el6_3.x86_64.rpm
     firefox-debuginfo-10.0.12-1.el6_3.i686.rpm
     firefox-debuginfo-10.0.12-1.el6_3.x86_64.rpm
     xulrunner-10.0.12-1.el6_3.i686.rpm
     xulrunner-10.0.12-1.el6_3.x86_64.rpm
     xulrunner-debuginfo-10.0.12-1.el6_3.i686.rpm
     xulrunner-debuginfo-10.0.12-1.el6_3.x86_64.rpm
     xulrunner-devel-10.0.12-1.el6_3.i686.rpm
     xulrunner-devel-10.0.12-1.el6_3.x86_64.rpm
   i386
     firefox-10.0.12-1.el6_3.i686.rpm
     firefox-debuginfo-10.0.12-1.el6_3.i686.rpm
     xulrunner-10.0.12-1.el6_3.i686.rpm
     xulrunner-debuginfo-10.0.12-1.el6_3.i686.rpm
     xulrunner-devel-10.0.12-1.el6_3.i686.rpm

- Scientific Linux Development Team
 
CD: 3ms