MESSAGE
DATE | 2012-02-15 |
FROM | Ruben Safir
|
SUBJECT | Subject: [NYLXS - HANGOUT] [security-announce] openSUSE-SU-2012:0258-1: critical:
|
From owner-hangout-outgoing-at-mrbrklyn.com Wed Feb 15 19:53:16 2012 Return-Path: X-Original-To: archive-at-mrbrklyn.com Delivered-To: archive-at-mrbrklyn.com Received: by www2.mrbrklyn.com (Postfix) id D409BD9598; Wed, 15 Feb 2012 19:53:15 -0500 (EST) Delivered-To: hangout-outgoing-at-www2.mrbrklyn.com Received: by www2.mrbrklyn.com (Postfix, from userid 28) id C0FC8100BE1; Wed, 15 Feb 2012 19:53:15 -0500 (EST) Delivered-To: hangout-at-nylxs.com Received: from mailbackend.panix.com (mailbackend2.panix.com [166.84.1.78]) by www2.mrbrklyn.com (Postfix) with ESMTP id 50215D9598 for ; Wed, 15 Feb 2012 19:53:15 -0500 (EST) Received: from panix2.panix.com (panix2.panix.com [166.84.1.2]) by mailbackend.panix.com (Postfix) with ESMTP id 8C81F32E7F for ; Wed, 15 Feb 2012 19:53:03 -0500 (EST) Received: by panix2.panix.com (Postfix, from userid 20529) id 73F6833C3C; Wed, 15 Feb 2012 19:53:03 -0500 (EST) Date: Wed, 15 Feb 2012 19:53:03 -0500 From: Ruben Safir To: NYLXS Subject: [NYLXS - HANGOUT] [security-announce] openSUSE-SU-2012:0258-1: critical: MozillaFirefox to 10.0.1 Message-ID: <20120216005303.GA3467-at-panix.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-06-14) Sender: owner-hangout-at-mrbrklyn.com Precedence: bulk Reply-To: hangout-at-mrbrklyn.com
openSUSE Security Update: MozillaFirefox to 10.0.1 ______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0258-1 Rating: critical References: #746616 Cross-References: CVE-2012-0452 Affected Products: openSUSE 11.4 ______________________________________________________________________________
An update that fixes one vulnerability is now available. It includes two new package versions.
Description:
MozillaFirefox was updated to 10.0.1 to fix critical bugs and security issue.
Following security issue was fixed: CVE-2012-0452: Mozilla developers Andrew McCreight and Olli Pettay found that ReadPrototypeBindings will leave a XBL binding in a hash table even when the function fails. If this occurs, when the cycle collector reads this hash table and attempts to do a virtual method on this binding a crash will occur. This crash may be potentially exploitable.
Firefox 9 and earlier are not affected by this vulnerability.
https://www.mozilla.org/security/announce/2012/mfsa2012-10.h tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch MozillaFirefox-5799 seamonkey-5804
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 10.0.1 and 2.7.1]:
MozillaFirefox-10.0.1-0.2.1 MozillaFirefox-branding-upstream-10.0.1-0.2.1 MozillaFirefox-buildsymbols-10.0.1-0.2.1 MozillaFirefox-devel-10.0.1-0.2.1 MozillaFirefox-translations-common-10.0.1-0.2.1 MozillaFirefox-translations-other-10.0.1-0.2.1 seamonkey-2.7.1-0.2.1 seamonkey-dom-inspector-2.7.1-0.2.1 seamonkey-irc-2.7.1-0.2.1 seamonkey-translations-common-2.7.1-0.2.1 seamonkey-translations-other-2.7.1-0.2.1 seamonkey-venkman-2.7.1-0.2.1
References:
http://support.novell.com/security/cve/CVE-2012-0452.html https://bugzilla.novell.com/746616
|
|