Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Bonnie King <bonniek-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Critical: firefox on SL5.x, SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Wednesday 26th June 2013 00:55:58 UTC (over 3 years ago)
Synopsis:          Critical: firefox security update
Advisory ID:       SLSA-2013:0981-1
Issue Date:        2013-06-25
CVE Numbers:       CVE-2013-1682
                   CVE-2013-1684
                   CVE-2013-1685
                   CVE-2013-1686
                   CVE-2013-1687
                   CVE-2013-1690
                   CVE-2013-1692
                   CVE-2013-1693
                   CVE-2013-1694
                   CVE-2013-1697
--

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2013-1682, CVE-2013-1684, CVE-2013-1685,
CVE-2013-1686, CVE-2013-1687, CVE-2013-1690)

It was found that Firefox allowed data to be sent in the body of
XMLHttpRequest (XHR) HEAD requests. In some cases this could allow
attackers to conduct Cross-Site Request Forgery (CSRF) attacks.
(CVE-2013-1692)

Timing differences in the way Firefox processed SVG image files could
allow an attacker to read data across domains, potentially leading to
information disclosure. (CVE-2013-1693)

Two flaws were found in the way Firefox implemented some of its internal
structures (called wrappers). An attacker could use these flaws to bypass
some restrictions placed on them. This could lead to unexpected behavior
or a potentially exploitable crash. (CVE-2013-1694, CVE-2013-1697)

0.7 ESR, which corrects these issues. After installing the update, Firefox
must be restarted for the changes to take effect.
--

SL5
  x86_64
    firefox-17.0.7-1.el5_9.i386.rpm
    firefox-17.0.7-1.el5_9.x86_64.rpm
    firefox-debuginfo-17.0.7-1.el5_9.i386.rpm
    firefox-debuginfo-17.0.7-1.el5_9.x86_64.rpm
    xulrunner-17.0.7-1.el5_9.i386.rpm
    xulrunner-17.0.7-1.el5_9.x86_64.rpm
    xulrunner-debuginfo-17.0.7-1.el5_9.i386.rpm
    xulrunner-debuginfo-17.0.7-1.el5_9.x86_64.rpm
    xulrunner-devel-17.0.7-1.el5_9.i386.rpm
    xulrunner-devel-17.0.7-1.el5_9.x86_64.rpm
  i386
    firefox-17.0.7-1.el5_9.i386.rpm
    firefox-debuginfo-17.0.7-1.el5_9.i386.rpm
    xulrunner-17.0.7-1.el5_9.i386.rpm
    xulrunner-debuginfo-17.0.7-1.el5_9.i386.rpm
    xulrunner-devel-17.0.7-1.el5_9.i386.rpm
SL6
  x86_64
    firefox-17.0.7-1.el6_4.i686.rpm
    firefox-17.0.7-1.el6_4.x86_64.rpm
    firefox-debuginfo-17.0.7-1.el6_4.i686.rpm
    firefox-debuginfo-17.0.7-1.el6_4.x86_64.rpm
    xulrunner-17.0.7-1.el6_4.i686.rpm
    xulrunner-17.0.7-1.el6_4.x86_64.rpm
    xulrunner-debuginfo-17.0.7-1.el6_4.i686.rpm
    xulrunner-debuginfo-17.0.7-1.el6_4.x86_64.rpm
    xulrunner-devel-17.0.7-1.el6_4.i686.rpm
    xulrunner-devel-17.0.7-1.el6_4.x86_64.rpm
  i386
    firefox-17.0.7-1.el6_4.i686.rpm
    firefox-debuginfo-17.0.7-1.el6_4.i686.rpm
    xulrunner-17.0.7-1.el6_4.i686.rpm
    xulrunner-debuginfo-17.0.7-1.el6_4.i686.rpm
    xulrunner-devel-17.0.7-1.el6_4.i686.rpm

- Scientific Linux Development Team
 
CD: 3ms