xulrunner-1.9.2.4-9.0.1.AXS3

エラータID: AXSA:2010-369:02

Release date: 
Monday, June 28, 2010 - 16:36
Subject: 
xulrunner-1.9.2.4-9.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

XULRunner provides the XUL Runtime environment for Gecko applications.
Security issues fixed with this release:
CVE-2008-5913
An unspecified function in the JavaScript implementation in Mozilla Firefox creates and exposes a temporary footprint when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an in-session phishing attack. NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
CVE-2010-0182
The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
CVE-2010-1121
Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
CVE-2010-1125
The JavaScript implementation in Mozilla Firefox 3.x allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
CVE-2010-1196
Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
CVE-2010-1197
Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both Content-Disposition: attachment and Content-Type: multipart are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
CVE-2010-1198
Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
CVE-2010-1199
Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
CVE-2010-1200
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVE-2010-1202
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVE-2010-1203
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Fixed bugs and Enhancements:
far too many to list here, please refer to the release notes available here:
http://mozilla.com/en-US/firefox/3.6.4/releasenotes/
http://mozilla.com/en-US/firefox/3.6/releasenotes/
Additional information:
Some plugins might not function anymore, they might have to be manually updated.

Solution: 

Update packages.

Additional Info: 

To be installed at the same time as gnome-python2-extras-2.14.2-7.AXS3 and firefox-3.6.4-8.0.1.AXS3

Download: 

SRPMS
  1. xulrunner-1.9.2.4-9.0.1.AXS3.src.rpm
    MD5: 0f5874d3ce1d5ace03b85d8a6a26141b
    SHA-256: 9979e9b2264e0793d10afb20c0955f2a0f663517e7afcc551e64ebde16a0ef05
    Size: 48.45 MB

Asianux Server 3 for x86
  1. xulrunner-1.9.2.4-9.0.1.AXS3.i386.rpm
    MD5: f05ad20f57bdef175cfd1a180df089f9
    SHA-256: 126ecd7279813f27bf6ff4e902190af2ce5dfe5dbec6f33cbaca1e225a577d33
    Size: 11.53 MB

Asianux Server 3 for x86_64
  1. xulrunner-1.9.2.4-9.0.1.AXS3.x86_64.rpm
    MD5: d7fa0fa3346da27981b32dd6b38df12b
    SHA-256: 46f88168232b599d2952b192ff3160b75727d8bba8289fed387d9ccbc6c87740
    Size: 10.96 MB