firefox-17.0.5-1.0.1.AXS4, xulrunner-17.0.5-1.0.1.AXS4

エラータID: AXSA:2013-321:03

Release date: 
Wednesday, April 10, 2013 - 13:01
Subject: 
firefox-17.0.5-1.0.1.AXS4, xulrunner-17.0.5-1.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It provides mechanisms for installing, upgrading, and uninstalling these applications. XULRunner also provides libxul, a solution which allows the embedding of Mozilla technologies in other projects and products.

Security issues fixed with this release:

• CVE-2013-0787
Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.

• CVE-2013-0788
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2013-0793
Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.

• CVE-2013-0795
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.

• CVE-2013-0796
The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.

• CVE-2013-0800
Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-17.0.5-1.0.1.AXS4.src.rpm
    MD5: fdd977728cce74fac11a98be15298d26
    SHA-256: 1ed1c35dcfc9882c306d0bc393e96282ef8ab299ef446d6e9657fcd6898b4ab5
    Size: 108.27 MB
  2. xulrunner-17.0.5-1.0.1.AXS4.src.rpm
    MD5: 62750c67bf1c6d81ef8a33be2dd191fb
    SHA-256: 22b586bfdf5fdfb917dba02e0bc032ee7db7502cfb3318d721f3c7f2fc16e3ed
    Size: 86.54 MB

Asianux Server 4 for x86
  1. firefox-17.0.5-1.0.1.AXS4.i686.rpm
    MD5: d19b8f196fa52c82ef2012e8ac95f6fd
    SHA-256: 409e709e75eb3528333be404c2db00440ec77cccc81af739e219d9a9135731f9
    Size: 25.39 MB
  2. xulrunner-17.0.5-1.0.1.AXS4.i686.rpm
    MD5: 41f9459201956f40b2da6bab73222a64
    SHA-256: 5087e5c4da829449ea934a6cb64faf72c8b14bc38cfee53b23dd9ce4c67fd294
    Size: 14.08 MB

Asianux Server 4 for x86_64
  1. firefox-17.0.5-1.0.1.AXS4.x86_64.rpm
    MD5: 0f5627ced5534ad7844fc631cca8ffd1
    SHA-256: 2b320b4ec34c6003bc35fd06d07a955cd09d2c0f9364f7dd1ca5f63fd1544e2b
    Size: 25.37 MB
  2. firefox-17.0.5-1.0.1.AXS4.i686.rpm
    MD5: d19b8f196fa52c82ef2012e8ac95f6fd
    SHA-256: 409e709e75eb3528333be404c2db00440ec77cccc81af739e219d9a9135731f9
    Size: 25.39 MB
  3. xulrunner-17.0.5-1.0.1.AXS4.x86_64.rpm
    MD5: 248a2f8af930008b26b1d7034b4b515e
    SHA-256: 768c32964fd2662362713850395dcfee87cf251c7271c07633e2258ed512e180
    Size: 14.85 MB
  4. xulrunner-17.0.5-1.0.1.AXS4.i686.rpm
    MD5: 41f9459201956f40b2da6bab73222a64
    SHA-256: 5087e5c4da829449ea934a6cb64faf72c8b14bc38cfee53b23dd9ce4c67fd294
    Size: 14.08 MB