Oval Definition:oval:com.redhat.rhsa:def:20121210
Revision Date:2012-08-29Version:635
Title:RHSA-2012:1210: firefox security update (Critical)
Description:Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox.

  • A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)

  • A web page containing a malicious Scalable Vector Graphics (SVG) image file could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)

  • Two flaws were found in the way Firefox rendered certain images using WebGL. A web page containing malicious content could cause Firefox to crash or, under certain conditions, possibly execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)

  • A flaw was found in the way Firefox decoded embedded bitmap images in Icon Format (ICO) files. A web page containing a malicious ICO file could cause Firefox to crash or, under certain conditions, possibly execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-3966)

  • A flaw was found in the way the "eval" command was handled by the Firefox Web Console. Running "eval" in the Web Console while viewing a web page containing malicious content could possibly cause Firefox to execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-3980)

  • An out-of-bounds memory read flaw was found in the way Firefox used the format-number feature of XSLT (Extensible Stylesheet Language Transformations). A web page containing malicious content could possibly cause an information leak, or cause Firefox to crash. (CVE-2012-3972)

  • It was found that the SSL certificate information for a previously visited site could be displayed in the address bar while the main window displayed a new page. This could lead to phishing attacks as attackers could use this flaw to trick users into believing they are viewing a trusted site. (CVE-2012-3976)

  • A flaw was found in the location object implementation in Firefox. Malicious content could use this flaw to possibly allow restricted content to be loaded. (CVE-2012-3978)

    For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 10.0.7 ESR. You can find a link to the Mozilla advisories in the References section of this erratum.

    Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Frédéric Hoguin, miaubiz, Arthur Gerkis, Nicolas Grégoire, Mark Poticha, moz_bug_r_a4, and Colby Russell as the original reporters of these issues.

    All Firefox users should upgrade to these updated packages, which contain Firefox version 10.0.7 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2012-1970
    CVE-2012-1970
    CVE-2012-1972
    CVE-2012-1972
    CVE-2012-1973
    CVE-2012-1973
    CVE-2012-1974
    CVE-2012-1974
    CVE-2012-1975
    CVE-2012-1975
    CVE-2012-1976
    CVE-2012-1976
    CVE-2012-3956
    CVE-2012-3956
    CVE-2012-3957
    CVE-2012-3957
    CVE-2012-3958
    CVE-2012-3958
    CVE-2012-3959
    CVE-2012-3959
    CVE-2012-3960
    CVE-2012-3960
    CVE-2012-3961
    CVE-2012-3961
    CVE-2012-3962
    CVE-2012-3962
    CVE-2012-3963
    CVE-2012-3963
    CVE-2012-3964
    CVE-2012-3964
    CVE-2012-3966
    CVE-2012-3966
    CVE-2012-3967
    CVE-2012-3967
    CVE-2012-3968
    CVE-2012-3968
    CVE-2012-3969
    CVE-2012-3969
    CVE-2012-3970
    CVE-2012-3970
    CVE-2012-3972
    CVE-2012-3972
    CVE-2012-3976
    CVE-2012-3976
    CVE-2012-3978
    CVE-2012-3978
    CVE-2012-3980
    CVE-2012-3980
    RHSA-2012:1210
    RHSA-2012:1210-01
    RHSA-2012:1210-01
    Platform(s):Red Hat Enterprise Linux 5
    Red Hat Enterprise Linux 6
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 5 is installed
  • AND
  • firefox is earlier than 0:10.0.7-1.el5_8
  • AND firefox is signed with Red Hat redhatrelease2 key
  • xulrunner is earlier than 0:10.0.7-2.el5_8
  • AND xulrunner is signed with Red Hat redhatrelease2 key
  • xulrunner-devel is earlier than 0:10.0.7-2.el5_8
  • AND xulrunner-devel is signed with Red Hat redhatrelease2 key
  • OR Package Information
  • Red Hat Enterprise Linux 6 is installed
  • AND
  • xulrunner is earlier than 0:10.0.7-1.el6_3
  • AND xulrunner is signed with Red Hat redhatrelease2 key
  • xulrunner-devel is earlier than 0:10.0.7-1.el6_3
  • AND xulrunner-devel is signed with Red Hat redhatrelease2 key
  • firefox is earlier than 0:10.0.7-1.el6_3
  • AND firefox is signed with Red Hat redhatrelease2 key
  • Definition Synopsis
  • Release Information
  • Red Hat Enterprise Linux 5 is installed
  • AND
  • firefox is earlier than 0:10.0.7-1.el5_8
  • AND firefox is signed with Red Hat redhatrelease key
  • xulrunner-devel is earlier than 0:10.0.7-2.el5_8
  • AND xulrunner-devel is signed with Red Hat redhatrelease key
  • xulrunner is earlier than 0:10.0.7-2.el5_8
  • AND xulrunner is signed with Red Hat redhatrelease key
  • OR Package Information
  • Red Hat Enterprise Linux 6 Client is installed
  • OR Red Hat Enterprise Linux 6 Server is installed
  • OR Red Hat Enterprise Linux 6 Workstation is installed
  • OR Red Hat Enterprise Linux 6 ComputeNode is installed
  • AND
  • xulrunner-devel is earlier than 0:10.0.7-1.el6_3
  • AND xulrunner-devel is signed with Red Hat redhatrelease2 key
  • xulrunner is earlier than 0:10.0.7-1.el6_3
  • AND xulrunner is signed with Red Hat redhatrelease2 key
  • firefox is earlier than 0:10.0.7-1.el6_3
  • AND firefox is signed with Red Hat redhatrelease2 key
  • BACK