RedHat: RHSA-2016-1551:01 Critical: firefox security update
Summary
Mozilla Firefox is an open source web browser.
This update upgrades Firefox to version 45.3.0 ESR.
Security Fix(es):
* Multiple flaws were found in the processing of malformed web content. A
web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2016-2836, CVE-2016-5258, CVE-2016-5259, CVE-2016-5252,
CVE-2016-5263, CVE-2016-2830, CVE-2016-2838, CVE-2016-5254, CVE-2016-5262,
CVE-2016-5264, CVE-2016-5265, CVE-2016-2837)
Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Looben Yang, Carsten Book, Christian Holler, Gary
Kwong, Jesse Ruderman, Andrew McCreight, Phil Ringnalda, Philipp, Toni
Huttunen, Georg Koppen, Abhishek Arya, Atte Kettunen, Nils, Nikita Arykov,
and Abdulrahman Alqabandi as the original reporters.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Firefox must be restarted for the changes to
take effect.
References
https://access.redhat.com/security/cve/CVE-2016-2830 https://access.redhat.com/security/cve/CVE-2016-2836 https://access.redhat.com/security/cve/CVE-2016-2837 https://access.redhat.com/security/cve/CVE-2016-2838 https://access.redhat.com/security/cve/CVE-2016-5252 https://access.redhat.com/security/cve/CVE-2016-5254 https://access.redhat.com/security/cve/CVE-2016-5258 https://access.redhat.com/security/cve/CVE-2016-5259 https://access.redhat.com/security/cve/CVE-2016-5262 https://access.redhat.com/security/cve/CVE-2016-5263 https://access.redhat.com/security/cve/CVE-2016-5264 https://access.redhat.com/security/cve/CVE-2016-5265 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr45.3
Package List
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
firefox-45.3.0-1.el5_11.src.rpm
i386:
firefox-45.3.0-1.el5_11.i386.rpm
firefox-debuginfo-45.3.0-1.el5_11.i386.rpm
x86_64:
firefox-45.3.0-1.el5_11.i386.rpm
firefox-45.3.0-1.el5_11.x86_64.rpm
firefox-debuginfo-45.3.0-1.el5_11.i386.rpm
firefox-debuginfo-45.3.0-1.el5_11.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
firefox-45.3.0-1.el5_11.src.rpm
i386:
firefox-45.3.0-1.el5_11.i386.rpm
firefox-debuginfo-45.3.0-1.el5_11.i386.rpm
ppc:
firefox-45.3.0-1.el5_11.ppc64.rpm
firefox-debuginfo-45.3.0-1.el5_11.ppc64.rpm
s390x:
firefox-45.3.0-1.el5_11.s390.rpm
firefox-45.3.0-1.el5_11.s390x.rpm
firefox-debuginfo-45.3.0-1.el5_11.s390.rpm
firefox-debuginfo-45.3.0-1.el5_11.s390x.rpm
x86_64:
firefox-45.3.0-1.el5_11.i386.rpm
firefox-45.3.0-1.el5_11.x86_64.rpm
firefox-debuginfo-45.3.0-1.el5_11.i386.rpm
firefox-debuginfo-45.3.0-1.el5_11.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source:
firefox-45.3.0-1.el6_8.src.rpm
i386:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
x86_64:
firefox-45.3.0-1.el6_8.x86_64.rpm
firefox-debuginfo-45.3.0-1.el6_8.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
x86_64:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
firefox-45.3.0-1.el6_8.src.rpm
x86_64:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-45.3.0-1.el6_8.x86_64.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
firefox-45.3.0-1.el6_8.src.rpm
i386:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
ppc64:
firefox-45.3.0-1.el6_8.ppc64.rpm
firefox-debuginfo-45.3.0-1.el6_8.ppc64.rpm
s390x:
firefox-45.3.0-1.el6_8.s390x.rpm
firefox-debuginfo-45.3.0-1.el6_8.s390x.rpm
x86_64:
firefox-45.3.0-1.el6_8.x86_64.rpm
firefox-debuginfo-45.3.0-1.el6_8.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
ppc64:
firefox-45.3.0-1.el6_8.ppc.rpm
firefox-debuginfo-45.3.0-1.el6_8.ppc.rpm
s390x:
firefox-45.3.0-1.el6_8.s390.rpm
firefox-debuginfo-45.3.0-1.el6_8.s390.rpm
x86_64:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
firefox-45.3.0-1.el6_8.src.rpm
i386:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
x86_64:
firefox-45.3.0-1.el6_8.x86_64.rpm
firefox-debuginfo-45.3.0-1.el6_8.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
x86_64:
firefox-45.3.0-1.el6_8.i686.rpm
firefox-debuginfo-45.3.0-1.el6_8.i686.rpm
Red Hat Enterprise Linux Client (v. 7):
Source:
firefox-45.3.0-1.el7_2.src.rpm
x86_64:
firefox-45.3.0-1.el7_2.x86_64.rpm
firefox-debuginfo-45.3.0-1.el7_2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
firefox-45.3.0-1.el7_2.i686.rpm
firefox-debuginfo-45.3.0-1.el7_2.i686.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
firefox-45.3.0-1.el7_2.src.rpm
ppc64:
firefox-45.3.0-1.el7_2.ppc64.rpm
firefox-debuginfo-45.3.0-1.el7_2.ppc64.rpm
ppc64le:
firefox-45.3.0-1.el7_2.ppc64le.rpm
firefox-debuginfo-45.3.0-1.el7_2.ppc64le.rpm
s390x:
firefox-45.3.0-1.el7_2.s390x.rpm
firefox-debuginfo-45.3.0-1.el7_2.s390x.rpm
x86_64:
firefox-45.3.0-1.el7_2.x86_64.rpm
firefox-debuginfo-45.3.0-1.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
firefox-45.3.0-1.el7_2.ppc.rpm
firefox-debuginfo-45.3.0-1.el7_2.ppc.rpm
s390x:
firefox-45.3.0-1.el7_2.s390.rpm
firefox-debuginfo-45.3.0-1.el7_2.s390.rpm
x86_64:
firefox-45.3.0-1.el7_2.i686.rpm
firefox-debuginfo-45.3.0-1.el7_2.i686.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
firefox-45.3.0-1.el7_2.src.rpm
x86_64:
firefox-45.3.0-1.el7_2.x86_64.rpm
firefox-debuginfo-45.3.0-1.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
firefox-45.3.0-1.el7_2.i686.rpm
firefox-debuginfo-45.3.0-1.el7_2.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for firefox is now available for Red Hat Enterprise Linux 5, RedHat Enterprise Linux 6, and Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Critical. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Bugs Fixed
1342897 - CVE-2016-2830 Mozilla: Favicon network connection persists when page is closed (MFSA 2016-62)
1361974 - CVE-2016-2836 Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62)
1361976 - CVE-2016-2838 Mozilla: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)
1361979 - CVE-2016-5252 Mozilla: Stack underflow during 2D graphics rendering (MFSA 2016-67)
1361980 - CVE-2016-5254 Mozilla: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)
1361982 - CVE-2016-5258 Mozilla: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)
1361984 - CVE-2016-5259 Mozilla: Use-after-free in service workers with nested sync events (MFSA 2016-73)
1361987 - CVE-2016-5262 Mozilla: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)
1361989 - CVE-2016-2837 Mozilla: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)
1361991 - CVE-2016-5263 Mozilla: Type confusion in display transformation (MFSA 2016-78)
1361992 - CVE-2016-5264 Mozilla: Use-after-free when applying SVG effects (MFSA 2016-79)
1361994 - CVE-2016-5265 Mozilla: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)