[RHSA-2011:1164] firefox security update
Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2011-2982)
A dangling pointer flaw was found in the Firefox Scalable Vector Graphics
(SVG) text manipulation routine. A web page containing a malicious SVG
image could cause Firefox to crash or, potentially, execute arbitrary code
with the privileges of the user running Firefox. (CVE-2011-0084)
A dangling pointer flaw was found in the way Firefox handled a certain
Document Object Model (DOM) element. A web page containing malicious
content could cause Firefox to crash or, potentially, execute arbitrary
code with the privileges of the user running Firefox. (CVE-2011-2378)
A flaw was found in the event management code in Firefox. A website
containing malicious JavaScript could cause Firefox to execute that
JavaScript with the privileges of the user running Firefox. (CVE-2011-2981)
A flaw was found in the way Firefox handled malformed JavaScript. A web
page containing malicious JavaScript could cause Firefox to access already
freed memory, causing Firefox to crash or, potentially, execute arbitrary
code with the privileges of the user running Firefox. (CVE-2011-2983)
It was found that a malicious web page could execute arbitrary code with
the privileges of the user running Firefox if the user dropped a tab onto
the malicious web page. (CVE-2011-2984)
For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.6.20. You can find a link to the Mozilla
advisories in the References section of this erratum.
All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.6.20, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.
- ID
- RHSA-2011:1164
- Severity
- critical
- URL
- https://access.redhat.com/errata/RHSA-2011:1164
- Published
-
2011-08-16T00:00:00
(13 years ago) - Modified
-
2011-08-16T00:00:00
(13 years ago) - Rights
- Copyright 2011 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 730518 | https://bugzilla.redhat.com/730518 | |
Bugzilla | 730519 | https://bugzilla.redhat.com/730519 | |
Bugzilla | 730520 | https://bugzilla.redhat.com/730520 | |
Bugzilla | 730521 | https://bugzilla.redhat.com/730521 | |
Bugzilla | 730522 | https://bugzilla.redhat.com/730522 | |
Bugzilla | 730523 | https://bugzilla.redhat.com/730523 | |
RHSA | RHSA-2011:1164 | https://access.redhat.com/errata/RHSA-2011:1164 | |
CVE | CVE-2011-0084 | https://access.redhat.com/security/cve/CVE-2011-0084 | |
CVE | CVE-2011-2378 | https://access.redhat.com/security/cve/CVE-2011-2378 | |
CVE | CVE-2011-2981 | https://access.redhat.com/security/cve/CVE-2011-2981 | |
CVE | CVE-2011-2982 | https://access.redhat.com/security/cve/CVE-2011-2982 | |
CVE | CVE-2011-2983 | https://access.redhat.com/security/cve/CVE-2011-2983 | |
CVE | CVE-2011-2984 | https://access.redhat.com/security/cve/CVE-2011-2984 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/xulrunner?arch=x86_64&distro=redhat-6.1 | redhat | xulrunner | < 1.9.2.20-2.el6_1 | redhat-6.1 | x86_64 | |
Affected | pkg:rpm/redhat/xulrunner?arch=s390x&distro=redhat-6.1 | redhat | xulrunner | < 1.9.2.20-2.el6_1 | redhat-6.1 | s390x | |
Affected | pkg:rpm/redhat/xulrunner?arch=s390&distro=redhat-6.1 | redhat | xulrunner | < 1.9.2.20-2.el6_1 | redhat-6.1 | s390 | |
Affected | pkg:rpm/redhat/xulrunner?arch=ppc64&distro=redhat-6.1 | redhat | xulrunner | < 1.9.2.20-2.el6_1 | redhat-6.1 | ppc64 | |
Affected | pkg:rpm/redhat/xulrunner?arch=ppc&distro=redhat-6.1 | redhat | xulrunner | < 1.9.2.20-2.el6_1 | redhat-6.1 | ppc | |
Affected | pkg:rpm/redhat/xulrunner?arch=i686&distro=redhat-6.1 | redhat | xulrunner | < 1.9.2.20-2.el6_1 | redhat-6.1 | i686 | |
Affected | pkg:rpm/redhat/xulrunner-devel?arch=x86_64&distro=redhat-6.1 | redhat | xulrunner-devel | < 1.9.2.20-2.el6_1 | redhat-6.1 | x86_64 | |
Affected | pkg:rpm/redhat/xulrunner-devel?arch=s390x&distro=redhat-6.1 | redhat | xulrunner-devel | < 1.9.2.20-2.el6_1 | redhat-6.1 | s390x | |
Affected | pkg:rpm/redhat/xulrunner-devel?arch=s390&distro=redhat-6.1 | redhat | xulrunner-devel | < 1.9.2.20-2.el6_1 | redhat-6.1 | s390 | |
Affected | pkg:rpm/redhat/xulrunner-devel?arch=ppc64&distro=redhat-6.1 | redhat | xulrunner-devel | < 1.9.2.20-2.el6_1 | redhat-6.1 | ppc64 | |
Affected | pkg:rpm/redhat/xulrunner-devel?arch=ppc&distro=redhat-6.1 | redhat | xulrunner-devel | < 1.9.2.20-2.el6_1 | redhat-6.1 | ppc | |
Affected | pkg:rpm/redhat/xulrunner-devel?arch=i686&distro=redhat-6.1 | redhat | xulrunner-devel | < 1.9.2.20-2.el6_1 | redhat-6.1 | i686 | |
Affected | pkg:rpm/redhat/firefox?arch=x86_64&distro=redhat-6.1 | redhat | firefox | < 3.6.20-2.el6_1 | redhat-6.1 | x86_64 | |
Affected | pkg:rpm/redhat/firefox?arch=s390x&distro=redhat-6.1 | redhat | firefox | < 3.6.20-2.el6_1 | redhat-6.1 | s390x | |
Affected | pkg:rpm/redhat/firefox?arch=s390&distro=redhat-6.1 | redhat | firefox | < 3.6.20-2.el6_1 | redhat-6.1 | s390 | |
Affected | pkg:rpm/redhat/firefox?arch=ppc64&distro=redhat-6.1 | redhat | firefox | < 3.6.20-2.el6_1 | redhat-6.1 | ppc64 | |
Affected | pkg:rpm/redhat/firefox?arch=ppc&distro=redhat-6.1 | redhat | firefox | < 3.6.20-2.el6_1 | redhat-6.1 | ppc | |
Affected | pkg:rpm/redhat/firefox?arch=i686&distro=redhat-6.1 | redhat | firefox | < 3.6.20-2.el6_1 | redhat-6.1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |