Rhsa-2009:0315: Critical Security Update - Red Hat ENTERPRISE LINUX 5.4 - TECHNICAL NOTES Manual

Hide thumbs Also See for ENTERPRISE LINUX 5.4 - TECHNICAL NOTES:
Table of Contents

Advertisement

Chapter 1. Package Updates
A memory corruption flaw was discovered in the way Firefox handles XML files containing an XSLT
transform. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code
as the user running Firefox.
A flaw was discovered in the way Firefox handles certain XUL garbage collection events. A remote
attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running
Firefox.
(CVE-2009-1044
For technical details regarding these flaws, refer to the Mozilla security advisories. You can find a link
to the Mozilla advisories in the References section of this errata.
Firefox users should upgrade to these updated packages, which resolve these issues. For Red Hat
Enterprise Linux 4, they contain backported patches to the firefox package. For Red Hat Enterprise
Linux 5, they contain backported patches to the xulrunner packages. After installing the update,
Firefox must be restarted for the changes to take effect.

1.57.6. RHSA-2009:0315: Critical security update

Important
This update has already been released (prior to the GA of this release) as the security
RHSA-2009:0315
errata
An updated firefox package that fixes various security issues is now available for Red Hat Enterprise
Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response
Team.
Mozilla Firefox is an open source Web browser.
Several flaws were found in the processing of malformed web content. A web page containing
malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user
running Firefox.
(CVE-2009-0040
375
CVE-2009-0774
CVE-2009-0775
,
Several flaws were found in the way malformed content was processed. A website containing
specially-crafted content could, potentially, trick a Firefox user into surrendering sensitive information.
377
CVE-2009-0777
(CVE-2009-0776
,
For technical details regarding these flaws, please see the Mozilla security advisories for Firefox 3.0.7.
You can find a link to the Mozilla advisories in the References section of this errata.
368
https://www.redhat.com/security/data/cve/CVE-2009-1169.html
369
https://www.redhat.com/security/data/cve/CVE-2009-1044.html
371
https://www.redhat.com/security/data/cve/CVE-2009-0040.html
372
https://www.redhat.com/security/data/cve/CVE-2009-0771.html
373
https://www.redhat.com/security/data/cve/CVE-2009-0772.html
374
https://www.redhat.com/security/data/cve/CVE-2009-0773.html
375
https://www.redhat.com/security/data/cve/CVE-2009-0774.html
376
https://www.redhat.com/security/data/cve/CVE-2009-0775.html
377
https://www.redhat.com/security/data/cve/CVE-2009-0776.html
378
https://www.redhat.com/security/data/cve/CVE-2009-0777.html
62
368
(CVE-2009-1169
369
)
370
371
CVE-2009-0771
,
376
)
378
)
)
372
CVE-2009-0772
,
373
374
CVE-2009-0773
,
,

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ENTERPRISE LINUX 5.4 - TECHNICAL NOTES and is the answer not in the manual?

Questions and answers

Table of Contents