Linux Security
Linux Security
Linux Security

Debian: DSA-2027-1: New xulrunner packages fix several vulnerabilities

Date 03 Apr 2010
Posted By LinuxSecurity Advisories
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser. The Common Vulnerabilities and Exposures project identifies the following problems:
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2027-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
April 03, 2010              
- ------------------------------------------------------------------------

Package        : xulrunner
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2010-0174 CVE-2010-0175 CVE-2010-0176 CVE-2010-0177 CVE-2010-0178 CVE-2010-0179

Several remote vulnerabilities have been discovered in Xulrunner, a 
runtime environment for XUL applications, such as the Iceweasel web
browser. The Common Vulnerabilities and Exposures project identifies 
the following problems:


    Jesse Ruderman and Ehsan Akhgari discovered crashes in the layout
    engine, which might allow the execution of arbitrary code.


    It was discovered that incorrect memory handling in the XUL event
    handler might allow the execution of arbitrary code.


    It was discovered that incorrect memory handling in the XUL event
    handler might allow the execution of arbitrary code.


    It was discovered that incorrect memory handling in the plugin code
    might allow the execution of arbitrary code.


    Paul Stone discovered that forced drag-and-drop events could lead to
    Chrome privilege escalation.


    It was discovered that a programming error in the XMLHttpRequestSpy
    module could lead to the execution of arbitrary code.

For the stable distribution (lenny), these problems have been fixed in

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your xulrunner packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum: 44174623 83667df1e46399960593fdd8832e958e
    Size/MD5 checksum:   116550 6c9e415004f27291e49f84e90d1d0131
    Size/MD5 checksum:     1755 e04cb5b6bd5b8b7f9add59c8a806e3c8

Architecture independent packages:
    Size/MD5 checksum:  1465282 ce022b6790d6e14f4b788c308653dab8

alpha architecture (DEC Alpha)
    Size/MD5 checksum:  9484100 a782bd0ed837f3432c71a109dd98d045
    Size/MD5 checksum:   223290 ecb8f397d3e6c7463b1c24c0a8ee3675
    Size/MD5 checksum:   433032 7eec73671d538f485671874579557bc5
    Size/MD5 checksum: 51124160 1a6dcf57c7d1185c6d95ea4d8bad1f12
    Size/MD5 checksum:   165330 ee07c899e85d144a8f04ecb462e1c780
    Size/MD5 checksum:   113322 ac5b08d50ccb70971bb42f44dd938eb3
    Size/MD5 checksum:  3356812 f445e0ef422d18b9428ee8190810eb5f
    Size/MD5 checksum:    72410 b6055fee3f283a3b4f299398d156a21a
    Size/MD5 checksum:   940016 fc6778b3d408736e10d43b5f30d2469a

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    70096 59959a92c5cd12582b36000575b81b98
    Size/MD5 checksum:   223180 7b656ca6976ca0bc5e5dac21a2566807
    Size/MD5 checksum:   890448 643a3817476fd091dca841dfcefd4584
    Size/MD5 checksum:   101702 96847a84ad24da47f98b4b332870c6bb
    Size/MD5 checksum:   374384 85617766ed0a0ac960db1664b51f7891
    Size/MD5 checksum:   152132 edcab736e161e97cf9738f43aecf2272
    Size/MD5 checksum: 50350940 d38916e2024e9dc46dc40a30da643f2a
    Size/MD5 checksum:  3290136 7b32902cd2a92a45a4b8f7163b684ad9
    Size/MD5 checksum:  7730682 b4f1fc1f804898e1e6e787c1e826dfcf

arm architecture (ARM)
    Size/MD5 checksum:   140840 9213b7e72b0a4089d5e9220a3c2d1c59
    Size/MD5 checksum:   815414 c2ecc249eaaf006274019578d9325467
    Size/MD5 checksum:    84082 5a539ed642fe58a23f7e36046d6880f7
    Size/MD5 checksum:   222238 67145776fd90e6218a1b75e6c6b7c3d9
    Size/MD5 checksum: 49312054 9aa19e14aacb0afaced2067f9923ea0b
    Size/MD5 checksum:  6798174 3706217040f237a960bc122fc7fee5dd
    Size/MD5 checksum:   350754 1d4d221f446d90b0d6e4b6b86f4fedbd
    Size/MD5 checksum:  3583612 899a0b80111ae54cf2f97ba747f7e90f
    Size/MD5 checksum:    68406 941ade1edf2e875e257b65334c85ad57

armel architecture (ARM EABI)
    Size/MD5 checksum:    84618 8b9e421b08f62fa826d4d4559d65657a
    Size/MD5 checksum:   353042 3ad84aaa456eef02cf30301ffcbcb331
    Size/MD5 checksum:   142304 a1d731a41a4c20089cdb96eeeb52b82c
    Size/MD5 checksum:   822678 6f6677d15e6995acc40b2a01867a8dff
    Size/MD5 checksum:  3583134 257b1b81c726f5e62968119519bbe0a6
    Size/MD5 checksum:   223240 c0c70b778f57a1fb6fa56a4d10a04757
    Size/MD5 checksum:  6959862 9484bbf6d85604dc0bbadb10f2205795
    Size/MD5 checksum:    70574 1ff9b320aa648dbeebf3558cdf33d266
    Size/MD5 checksum: 50147836 73702b83786ef3b8313edb56b29359f1

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   412450 a484d05bdf756bf3c4f11d47d7d9b0ae
    Size/MD5 checksum:   223022 0d4a5aa91ed4938685cbc2dc946b1624
    Size/MD5 checksum:   106090 ae7211d323ac2cf55efb86320d24f1d9
    Size/MD5 checksum: 51231378 0a89533b5c3cb6b30f86fc9305ba3699
    Size/MD5 checksum:    71534 b28b5e9086c3c714e41cb291caafb5e1
    Size/MD5 checksum:   158976 00d4f5c739aad8069d677d83424e523e
    Size/MD5 checksum:   898452 63b29a8fee489017233085ef111deff4
    Size/MD5 checksum:  3623488 b11650685105902470f644985c3ee4fb
    Size/MD5 checksum:  9517850 ef0a7bab2097c89458e1df4712bfe818

i386 architecture (Intel ia32)
    Size/MD5 checksum:    68224 d79dbbd49ccd869fbb75ba6a6463e824
    Size/MD5 checksum:   140848 8a2c2187f946dcee05fcb6a8ea7b2348
    Size/MD5 checksum:  3569760 2fcc2fff9a8622c93849bcd52a95d66b
    Size/MD5 checksum:   851994 10cebc4ce2b519229be78e0cb5b6bf24
    Size/MD5 checksum:   350988 81024ae846f8ef96e317c2f9fc732420
    Size/MD5 checksum:   222056 206b45fc3245d48c117b09ff9cf90f3b
    Size/MD5 checksum:    82716 22d5b3764a6dcd3bc35b5577a5de7bc0
    Size/MD5 checksum: 49523498 54a2e4f0ed19be5b0978ace5a379cb26
    Size/MD5 checksum:  6604388 7b0276ee4f8bb91d7900af2b437aa15b

ia64 architecture (Intel ia64)
    Size/MD5 checksum: 11307954 5f41a2e3292471699098a71dc7e07d86
    Size/MD5 checksum:   223272 53b380b4a2206b8e08239317210490db
    Size/MD5 checksum:   811282 b2bb56fb4744608c5a6d9adaa11ac956
    Size/MD5 checksum:   121662 87ae39bfee9b50c9530d8b862d0ec8ab
    Size/MD5 checksum:   542262 a490459aa56a72227d746771c7e4fd38
    Size/MD5 checksum: 49705360 fbf406c88d94e9df58b20c3860368a2f
    Size/MD5 checksum:  3399446 e35b0acdbbe8ea41549c5408b3c994e4
    Size/MD5 checksum:   180336 94e52072a9edeefebb3639b78e0906b9
    Size/MD5 checksum:    76664 2d9a7ae2827fb63f192a4a19b4b52dff

powerpc architecture (PowerPC)
    Size/MD5 checksum:  3592586 55c062ecc411207bd989b0c90043e669
    Size/MD5 checksum:   152718 0588b69278fa88cc4e46ee06b556b0c1
    Size/MD5 checksum:   363498 8f3cf54da3915e67381812b1b6443dd1
    Size/MD5 checksum:   888474 0ef63edd8c0adbe499bd669910e1e801
    Size/MD5 checksum:    94508 96f25e720c7fd9afef7b5f6307c7ce2c
    Size/MD5 checksum:  7305390 3fb096941c22e896f65de9d05feab1e5
    Size/MD5 checksum: 51430576 13d14a97056d060ef434c2371396b7eb
    Size/MD5 checksum:    73504 94ef4eceab50e6bc4189abee7b5a4e02
    Size/MD5 checksum:   223302 3129fdf4c4ac144ea9dd2eac197b810a

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum: 49375616 86a3efe68f31cd50c54cd732d1969869
    Size/MD5 checksum:    69526 9b077b92e08e5c424d3dda70bf9e0221
    Size/MD5 checksum:   350202 9add4dc2667d1e66bfcecf3c51b20446
    Size/MD5 checksum:   143276 90f5793e4ef8289563a2aa0412d8f1f3
    Size/MD5 checksum:   821462 70e73a7be0077bea49846ef049ec1a14
    Size/MD5 checksum:  7173522 752cec72a8bc6f013a0e5ae4798fb9fa
    Size/MD5 checksum:    88382 b0abf523058087e5f96d9acf0a8adb07
    Size/MD5 checksum:   222434 42ac86dea6c9bfbb986192440b6cf936
    Size/MD5 checksum:  3569660 af4abe4b40d62e158ee09c4e6c908720

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.