drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Mozilla Firefox
Name: |
Denial of Service in Mozilla Firefox |
|
ID: |
openSUSE-SU-2012:0258-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
openSUSE 11.4 |
|
Datum: |
Di, 14. Februar 2012, 22:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452 |
|
Applikationen: |
Mozilla Firefox |
|
Originalnachricht |
openSUSE Security Update: MozillaFirefox to 10.0.1 ______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0258-1 Rating: critical References: #746616 Cross-References: CVE-2012-0452 Affected Products: openSUSE 11.4 ______________________________________________________________________________
An update that fixes one vulnerability is now available. It includes two new package versions.
Description:
MozillaFirefox was updated to 10.0.1 to fix critical bugs and security issue.
Following security issue was fixed: CVE-2012-0452: Mozilla developers Andrew McCreight and Olli Pettay found that ReadPrototypeBindings will leave a XBL binding in a hash table even when the function fails. If this occurs, when the cycle collector reads this hash table and attempts to do a virtual method on this binding a crash will occur. This crash may be potentially exploitable.
Firefox 9 and earlier are not affected by this vulnerability.
https://www.mozilla.org/security/announce/2012/mfsa2012-10.h tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch MozillaFirefox-5799 seamonkey-5804
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 10.0.1 and 2.7.1]:
MozillaFirefox-10.0.1-0.2.1 MozillaFirefox-branding-upstream-10.0.1-0.2.1 MozillaFirefox-buildsymbols-10.0.1-0.2.1 MozillaFirefox-devel-10.0.1-0.2.1 MozillaFirefox-translations-common-10.0.1-0.2.1 MozillaFirefox-translations-other-10.0.1-0.2.1 seamonkey-2.7.1-0.2.1 seamonkey-dom-inspector-2.7.1-0.2.1 seamonkey-irc-2.7.1-0.2.1 seamonkey-translations-common-2.7.1-0.2.1 seamonkey-translations-other-2.7.1-0.2.1 seamonkey-venkman-2.7.1-0.2.1
References:
http://support.novell.com/security/cve/CVE-2012-0452.html https://bugzilla.novell.com/746616
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|