-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: firefox security update Advisory ID: RHSA-2008:0103-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0103.html Issue date: 2008-02-07 CVE Names: CVE-2008-0412 CVE-2008-0413 CVE-2008-0415 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593 =====================================================================
1. Summary:
Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Description:
Mozilla Firefox is an open source Web browser.
Several flaws were found in the way Firefox processed certain malformed web content. A webpage containing malicious content could cause Firefox to crash, or potentially execute arbitrary code as the user running Firefox. (CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0419)
Several flaws were found in the way Firefox displayed malformed web content. A webpage containing specially-crafted content could trick a user into surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593)
A flaw was found in the way Firefox stored password data. If a user saves login information for a malicious website, it could be possible to corrupt the password database, preventing the user from properly accessing saved password data. (CVE-2008-0417)
A flaw was found in the way Firefox handles certain chrome URLs. If a user has certain extensions installed, it could allow a malicious website to steal sensitive session data. Note: this flaw does not affect a default installation of Firefox. (CVE-2008-0418)
A flaw was found in the way Firefox saves certain text files. If a website offers a file of type "plain/text", rather than "text/plain", Firefox will not show future "text/plain" content to the user in the browser, forcing them to save those files locally to view the content. (CVE-2008-0592)
Users of firefox are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bugs fixed (http://bugzilla.redhat.com/):
431732 - CVE-2008-0412 Mozilla layout engine crashes 431733 - CVE-2008-0413 Mozilla javascript engine crashes 431739 - CVE-2008-0415 Mozilla arbitrary code execution 431742 - CVE-2008-0417 Mozilla arbitrary code execution 431748 - CVE-2008-0418 Mozilla chrome: directory traversal 431749 - CVE-2008-0419 Mozilla arbitrary code execution 431751 - CVE-2008-0591 Mozilla information disclosure flaw 431752 - CVE-2008-0592 Mozilla text file mishandling 431756 - CVE-2008-0593 Mozilla URL token stealing flaw
6. Package List:
Red Hat Enterprise Linux AS version 4:
Source: firefox-1.5.0.12-0.10.el4.src.rpm
i386: firefox-1.5.0.12-0.10.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.10.el4.i386.rpm
ia64: firefox-1.5.0.12-0.10.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.ia64.rpm
ppc: firefox-1.5.0.12-0.10.el4.ppc.rpm firefox-debuginfo-1.5.0.12-0.10.el4.ppc.rpm
s390: firefox-1.5.0.12-0.10.el4.s390.rpm firefox-debuginfo-1.5.0.12-0.10.el4.s390.rpm
s390x: firefox-1.5.0.12-0.10.el4.s390x.rpm firefox-debuginfo-1.5.0.12-0.10.el4.s390x.rpm
x86_64: firefox-1.5.0.12-0.10.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source: firefox-1.5.0.12-0.10.el4.src.rpm
i386: firefox-1.5.0.12-0.10.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.10.el4.i386.rpm
x86_64: firefox-1.5.0.12-0.10.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source: firefox-1.5.0.12-0.10.el4.src.rpm
i386: firefox-1.5.0.12-0.10.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.10.el4.i386.rpm
ia64: firefox-1.5.0.12-0.10.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.ia64.rpm
x86_64: firefox-1.5.0.12-0.10.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source: firefox-1.5.0.12-0.10.el4.src.rpm
i386: firefox-1.5.0.12-0.10.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.10.el4.i386.rpm
ia64: firefox-1.5.0.12-0.10.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.ia64.rpm
x86_64: firefox-1.5.0.12-0.10.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.10.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: firefox-1.5.0.12-9.el5.src.rpm
i386: firefox-1.5.0.12-9.el5.i386.rpm firefox-debuginfo-1.5.0.12-9.el5.i386.rpm
x86_64: firefox-1.5.0.12-9.el5.i386.rpm firefox-1.5.0.12-9.el5.x86_64.rpm firefox-debuginfo-1.5.0.12-9.el5.i386.rpm firefox-debuginfo-1.5.0.12-9.el5.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: firefox-1.5.0.12-9.el5.src.rpm
i386: firefox-debuginfo-1.5.0.12-9.el5.i386.rpm firefox-devel-1.5.0.12-9.el5.i386.rpm
x86_64: firefox-debuginfo-1.5.0.12-9.el5.i386.rpm firefox-debuginfo-1.5.0.12-9.el5.x86_64.rpm firefox-devel-1.5.0.12-9.el5.i386.rpm firefox-devel-1.5.0.12-9.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: firefox-1.5.0.12-9.el5.src.rpm
i386: firefox-1.5.0.12-9.el5.i386.rpm firefox-debuginfo-1.5.0.12-9.el5.i386.rpm firefox-devel-1.5.0.12-9.el5.i386.rpm
ia64: firefox-1.5.0.12-9.el5.ia64.rpm firefox-debuginfo-1.5.0.12-9.el5.ia64.rpm firefox-devel-1.5.0.12-9.el5.ia64.rpm
ppc: firefox-1.5.0.12-9.el5.ppc.rpm firefox-debuginfo-1.5.0.12-9.el5.ppc.rpm firefox-devel-1.5.0.12-9.el5.ppc.rpm
s390x: firefox-1.5.0.12-9.el5.s390.rpm firefox-1.5.0.12-9.el5.s390x.rpm firefox-debuginfo-1.5.0.12-9.el5.s390.rpm firefox-debuginfo-1.5.0.12-9.el5.s390x.rpm firefox-devel-1.5.0.12-9.el5.s390.rpm firefox-devel-1.5.0.12-9.el5.s390x.rpm
x86_64: firefox-1.5.0.12-9.el5.i386.rpm firefox-1.5.0.12-9.el5.x86_64.rpm firefox-debuginfo-1.5.0.12-9.el5.i386.rpm firefox-debuginfo-1.5.0.12-9.el5.x86_64.rpm firefox-devel-1.5.0.12-9.el5.i386.rpm firefox-devel-1.5.0.12-9.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593 http://www.redhat.com/security/updates/classification/#critical
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHq8P3XlSAg2UNWIIRAiwUAKDEhVOF1MaHoBHoxZJfkm1to0LjHQCfe3tz YXAwimdo3jkWcuehgg5OTRc= =DP8X -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|