[RHSA-2012:1350] firefox security and bug fix update

Severity Critical
Affected Packages 18
CVEs 20

Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,
CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,
CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)

Two flaws in Firefox could allow a malicious website to bypass intended
restrictions, possibly leading to information disclosure, or Firefox
executing arbitrary code. Note that the information disclosure issue could
possibly be combined with other flaws to achieve arbitrary code execution.
(CVE-2012-3986, CVE-2012-3991)

Multiple flaws were found in the location object implementation in Firefox.
Malicious content could be used to perform cross-site scripting attacks,
script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,
CVE-2012-3994)

Two flaws were found in the way Chrome Object Wrappers were implemented.
Malicious content could be used to perform cross-site scripting attacks or
cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,
miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,
moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these
issues.

This update also fixes the following bug:

  • In certain environments, storing personal Firefox configuration files (~/.mozilla/) on an NFS share, such as when your home directory is on a NFS share, led to Firefox functioning incorrectly, for example, navigation buttons not working as expected, and bookmarks not saving. This update adds a new configuration option, storage.nfs_filesystem, that can be used to resolve this issue.

If you experience this issue:

1) Start Firefox.

2) Type "about:config" (without quotes) into the URL bar and press the
Enter key.

3) If prompted with "This might void your warranty!", click the "I'll be
careful, I promise!" button.

4) Right-click in the Preference Name list. In the menu that opens, select
New -> Boolean.

5) Type "storage.nfs_filesystem" (without quotes) for the preference name
and then click the OK button.

6) Select "true" for the boolean value and then press the OK button.
(BZ#809571, BZ#816234)

All Firefox users should upgrade to these updated packages, which contain
Firefox version 10.0.8 ESR, which corrects these issues. After installing
the update, Firefox must be restarted for the changes to take effect.

ID
RHSA-2012:1350
Severity
critical
URL
https://access.redhat.com/errata/RHSA-2012:1350
Published
2012-10-09T00:00:00
(12 years ago)
Modified
2012-10-09T00:00:00
(12 years ago)
Rights
Copyright 2012 Red Hat, Inc.
Other Advisories
Source # ID Name URL
Bugzilla 851912 https://bugzilla.redhat.com/851912
Bugzilla 863614 https://bugzilla.redhat.com/863614
Bugzilla 863618 https://bugzilla.redhat.com/863618
Bugzilla 863619 https://bugzilla.redhat.com/863619
Bugzilla 863621 https://bugzilla.redhat.com/863621
Bugzilla 863622 https://bugzilla.redhat.com/863622
Bugzilla 863623 https://bugzilla.redhat.com/863623
Bugzilla 863624 https://bugzilla.redhat.com/863624
Bugzilla 863625 https://bugzilla.redhat.com/863625
Bugzilla 863626 https://bugzilla.redhat.com/863626
Bugzilla 863628 https://bugzilla.redhat.com/863628
RHSA RHSA-2012:1350 https://access.redhat.com/errata/RHSA-2012:1350
CVE CVE-2012-1956 https://access.redhat.com/security/cve/CVE-2012-1956
CVE CVE-2012-3982 https://access.redhat.com/security/cve/CVE-2012-3982
CVE CVE-2012-3986 https://access.redhat.com/security/cve/CVE-2012-3986
CVE CVE-2012-3988 https://access.redhat.com/security/cve/CVE-2012-3988
CVE CVE-2012-3990 https://access.redhat.com/security/cve/CVE-2012-3990
CVE CVE-2012-3991 https://access.redhat.com/security/cve/CVE-2012-3991
CVE CVE-2012-3992 https://access.redhat.com/security/cve/CVE-2012-3992
CVE CVE-2012-3993 https://access.redhat.com/security/cve/CVE-2012-3993
CVE CVE-2012-3994 https://access.redhat.com/security/cve/CVE-2012-3994
CVE CVE-2012-3995 https://access.redhat.com/security/cve/CVE-2012-3995
CVE CVE-2012-4179 https://access.redhat.com/security/cve/CVE-2012-4179
CVE CVE-2012-4180 https://access.redhat.com/security/cve/CVE-2012-4180
CVE CVE-2012-4181 https://access.redhat.com/security/cve/CVE-2012-4181
CVE CVE-2012-4182 https://access.redhat.com/security/cve/CVE-2012-4182
CVE CVE-2012-4183 https://access.redhat.com/security/cve/CVE-2012-4183
CVE CVE-2012-4184 https://access.redhat.com/security/cve/CVE-2012-4184
CVE CVE-2012-4185 https://access.redhat.com/security/cve/CVE-2012-4185
CVE CVE-2012-4186 https://access.redhat.com/security/cve/CVE-2012-4186
CVE CVE-2012-4187 https://access.redhat.com/security/cve/CVE-2012-4187
CVE CVE-2012-4188 https://access.redhat.com/security/cve/CVE-2012-4188
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/xulrunner?arch=x86_64&distro=redhat-6.3 redhat xulrunner < 10.0.8-1.el6_3 redhat-6.3 x86_64
Affected pkg:rpm/redhat/xulrunner?arch=s390x&distro=redhat-6.3 redhat xulrunner < 10.0.8-1.el6_3 redhat-6.3 s390x
Affected pkg:rpm/redhat/xulrunner?arch=s390&distro=redhat-6.3 redhat xulrunner < 10.0.8-1.el6_3 redhat-6.3 s390
Affected pkg:rpm/redhat/xulrunner?arch=ppc64&distro=redhat-6.3 redhat xulrunner < 10.0.8-1.el6_3 redhat-6.3 ppc64
Affected pkg:rpm/redhat/xulrunner?arch=ppc&distro=redhat-6.3 redhat xulrunner < 10.0.8-1.el6_3 redhat-6.3 ppc
Affected pkg:rpm/redhat/xulrunner?arch=i686&distro=redhat-6.3 redhat xulrunner < 10.0.8-1.el6_3 redhat-6.3 i686
Affected pkg:rpm/redhat/xulrunner-devel?arch=x86_64&distro=redhat-6.3 redhat xulrunner-devel < 10.0.8-1.el6_3 redhat-6.3 x86_64
Affected pkg:rpm/redhat/xulrunner-devel?arch=s390x&distro=redhat-6.3 redhat xulrunner-devel < 10.0.8-1.el6_3 redhat-6.3 s390x
Affected pkg:rpm/redhat/xulrunner-devel?arch=s390&distro=redhat-6.3 redhat xulrunner-devel < 10.0.8-1.el6_3 redhat-6.3 s390
Affected pkg:rpm/redhat/xulrunner-devel?arch=ppc64&distro=redhat-6.3 redhat xulrunner-devel < 10.0.8-1.el6_3 redhat-6.3 ppc64
Affected pkg:rpm/redhat/xulrunner-devel?arch=ppc&distro=redhat-6.3 redhat xulrunner-devel < 10.0.8-1.el6_3 redhat-6.3 ppc
Affected pkg:rpm/redhat/xulrunner-devel?arch=i686&distro=redhat-6.3 redhat xulrunner-devel < 10.0.8-1.el6_3 redhat-6.3 i686
Affected pkg:rpm/redhat/firefox?arch=x86_64&distro=redhat-6.3 redhat firefox < 10.0.8-1.el6_3 redhat-6.3 x86_64
Affected pkg:rpm/redhat/firefox?arch=s390x&distro=redhat-6.3 redhat firefox < 10.0.8-1.el6_3 redhat-6.3 s390x
Affected pkg:rpm/redhat/firefox?arch=s390&distro=redhat-6.3 redhat firefox < 10.0.8-1.el6_3 redhat-6.3 s390
Affected pkg:rpm/redhat/firefox?arch=ppc64&distro=redhat-6.3 redhat firefox < 10.0.8-1.el6_3 redhat-6.3 ppc64
Affected pkg:rpm/redhat/firefox?arch=ppc&distro=redhat-6.3 redhat firefox < 10.0.8-1.el6_3 redhat-6.3 ppc
Affected pkg:rpm/redhat/firefox?arch=i686&distro=redhat-6.3 redhat firefox < 10.0.8-1.el6_3 redhat-6.3 i686
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...