Login
Newsletter
Werbung

Sicherheit: Denial of Service in Mozilla Firefox
Aktuelle Meldungen Distributionen
Name: Denial of Service in Mozilla Firefox
ID: openSUSE-SU-2012:0258-1
Distribution: SUSE
Plattformen: openSUSE 11.4
Datum: Di, 14. Februar 2012, 22:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452
Applikationen: Mozilla Firefox

Originalnachricht

   openSUSE Security Update: MozillaFirefox to 10.0.1
______________________________________________________________________________

Announcement ID: openSUSE-SU-2012:0258-1
Rating: critical
References: #746616
Cross-References: CVE-2012-0452
Affected Products:
openSUSE 11.4
______________________________________________________________________________

An update that fixes one vulnerability is now available. It
includes two new package versions.

Description:

MozillaFirefox was updated to 10.0.1 to fix critical bugs
and security issue.

Following security issue was fixed: CVE-2012-0452: Mozilla
developers Andrew McCreight and Olli Pettay found that
ReadPrototypeBindings will leave a XBL binding in a hash
table even when the function fails. If this occurs, when
the cycle collector reads this hash table and attempts to
do a virtual method on this binding a crash will occur.
This crash may be potentially exploitable.

Firefox 9 and earlier are not affected by this
vulnerability.

https://www.mozilla.org/security/announce/2012/mfsa2012-10.h
tml


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch MozillaFirefox-5799 seamonkey-5804

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64) [New Version: 10.0.1 and 2.7.1]:

MozillaFirefox-10.0.1-0.2.1
MozillaFirefox-branding-upstream-10.0.1-0.2.1
MozillaFirefox-buildsymbols-10.0.1-0.2.1
MozillaFirefox-devel-10.0.1-0.2.1
MozillaFirefox-translations-common-10.0.1-0.2.1
MozillaFirefox-translations-other-10.0.1-0.2.1
seamonkey-2.7.1-0.2.1
seamonkey-dom-inspector-2.7.1-0.2.1
seamonkey-irc-2.7.1-0.2.1
seamonkey-translations-common-2.7.1-0.2.1
seamonkey-translations-other-2.7.1-0.2.1
seamonkey-venkman-2.7.1-0.2.1


References:

http://support.novell.com/security/cve/CVE-2012-0452.html
https://bugzilla.novell.com/746616

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung