firefox-10.0.5-1.0.1.AXS4, xulrunner-10.0.5-1.0.1.AXS4

エラータID: AXSA:2012-857:04

リリース日: 
2012/09/11 Tuesday - 14:34
題名: 
firefox-10.0.5-1.0.1.AXS4, xulrunner-10.0.5-1.0.1.AXS4
影響のあるチャネル: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

以下項目について対処しました。

[Bug Fix]
• CVE-2011-3101
Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors. NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.

• CVE-2012-1937
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2012-1938
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.

• CVE-2012-1939
jsinfer.cpp in Mozilla Firefox ESR 10.x before 10.0.5 and Thunderbird ESR 10.x before 10.0.5 does not properly determine data types, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted JavaScript code.

• CVE-2012-1940
Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.

• CVE-2012-1941
Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.

• CVE-2012-1944
The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.

• CVE-2012-1945
Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.

• CVE-2012-1946
Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.

• CVE-2012-1947
Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.

解決策: 

パッケージをアップデートしてください。

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. firefox-10.0.5-1.0.1.AXS4.src.rpm
    MD5: 4f58b128126bd6c49d5561d2becc5c50
    SHA-256: 51afc3779d2da90a2dc82c14cd6f4243f09c134c3ec72cc0a656ed3e4c9aef59
    Size: 89.22 MB
  2. xulrunner-10.0.5-1.0.1.AXS4.src.rpm
    MD5: f749fadadfee5500d85d25cfd90ae5ba
    SHA-256: 9e5574dc82ddad7986fb71ddbb79d51adc70b70000da3550c29f8dc0a0d410d2
    Size: 71.64 MB

Asianux Server 4 for x86
  1. firefox-10.0.5-1.0.1.AXS4.i686.rpm
    MD5: e759499c652c473f327ddd33cbe6555a
    SHA-256: d10e4ebeab6a5666814f114d0835dba3c59fb93e4300ddbe79863f42a1e348aa
    Size: 19.80 MB
  2. xulrunner-10.0.5-1.0.1.AXS4.i686.rpm
    MD5: cf084d589462f8bedf86353c84c5d7fc
    SHA-256: 9dcf6b28c0975dc6ddb5041f0ba5461831f4c45db02d9d29122315869b6f01e1
    Size: 12.26 MB

Asianux Server 4 for x86_64
  1. firefox-10.0.5-1.0.1.AXS4.x86_64.rpm
    MD5: 729f512f87072b430e554068baa4c637
    SHA-256: 8a69f21b7b53337d99e34024b7aacf587af2091cafc8b5e58a5cc08f1afb9f7e
    Size: 19.82 MB
  2. firefox-10.0.5-1.0.1.AXS4.i686.rpm
    MD5: e759499c652c473f327ddd33cbe6555a
    SHA-256: d10e4ebeab6a5666814f114d0835dba3c59fb93e4300ddbe79863f42a1e348aa
    Size: 19.80 MB
  3. xulrunner-10.0.5-1.0.1.AXS4.x86_64.rpm
    MD5: 5c1dcd8fb3e6a5c4c2790b609c3c8f10
    SHA-256: fbfee3d103d96c6e0c2e8952a805240d41e53dd63218c5c07ddb8435fcc181a6
    Size: 11.92 MB
  4. xulrunner-10.0.5-1.0.1.AXS4.i686.rpm
    MD5: cf084d589462f8bedf86353c84c5d7fc
    SHA-256: 9dcf6b28c0975dc6ddb5041f0ba5461831f4c45db02d9d29122315869b6f01e1
    Size: 12.26 MB