firefox-17.0.10-1.0.1.AXS3, xulrunner-17.0.10-1.0.1.AXS3

エラータID: AXSA:2013-677:08

Release date: 
Monday, November 25, 2013 - 13:45
Subject: 
firefox-17.0.10-1.0.1.AXS3, xulrunner-17.0.10-1.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Security issues fixed with this release:

• CVE-2013-5590
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2013-5595
The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.

• CVE-2013-5597
Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.

• CVE-2013-5599
Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.

• CVE-2013-5600
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.

• CVE-2013-5601
Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.

• CVE-2013-5602
The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.

• CVE-2013-5604
The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-17.0.10-1.0.1.AXS3.src.rpm
    MD5: 710971ee21818478aab039cb175c0d72
    SHA-256: 9d4aacfe0b9a8a4e25103e3bcbab562f9864d384ead46a643a7231f44287cfa2
    Size: 107.74 MB
  2. xulrunner-17.0.10-1.0.1.AXS3.src.rpm
    MD5: 805d01dc7f7a6ebcf5004fcc09b1c00c
    SHA-256: 8276e3dcb345dc02dac4ec4d000a90167fec547ad051de89387c691640888935
    Size: 86.25 MB

Asianux Server 3 for x86
  1. firefox-17.0.10-1.0.1.AXS3.i386.rpm
    MD5: 3296b3451d5b3aca0a926620cb97449e
    SHA-256: 8aa67c367e2d5f4b4c307c41f97f2b2173b952f417d8afb2266cb8b56444540b
    Size: 25.73 MB
  2. xulrunner-17.0.10-1.0.1.AXS3.i386.rpm
    MD5: e077b6398ac27eeda62886f7f18f01c0
    SHA-256: c231ddf6cfe7f616894960847b96e5dda86435fff9db51a7e4645203aba3c2b6
    Size: 15.21 MB

Asianux Server 3 for x86_64
  1. firefox-17.0.10-1.0.1.AXS3.x86_64.rpm
    MD5: d3f4755891ce754d7d5ae4a95120c518
    SHA-256: 8d8f7dab6c6fb7e2c21d7b30a5eadda05ad35ab1163d21c25f95c9a8f108e088
    Size: 25.72 MB
  2. xulrunner-17.0.10-1.0.1.AXS3.x86_64.rpm
    MD5: d275ea4871933dd10f775ce9e5e464e3
    SHA-256: 689a3c9fedca95c9431121682cade9983d59ee0a50a3f955b67cd1ac71165617
    Size: 14.65 MB