Ubuntu 1157-1: Firefox vulnerabilities

    Date22 Jun 2011
    CategoryUbuntu
    65
    Posted ByLinuxSecurity Advisories
    Multiple Firefox vulnerabilities have been fixed
    ==========================================================================
    Ubuntu Security Notice USN-1157-1
    June 22, 2011
    
    firefox vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 11.04
    
    Summary:
    
    Multiple Firefox vulnerabilities have been fixed
    
    Software Description:
    - firefox: Safe and easy web browser from Mozilla
    
    Details:
    
    Bob Clary, Kevin Brosnan, Gary Kwong, Jesse Ruderman, Christian Biesinger,
    Bas Schouten, Igor Bukanov, Bill McCloskey, Olli Pettay, Daniel Veditz and
    Marcia Knous discovered multiple memory vulnerabilities in the browser
    rendering engine. An attacker could possibly execute arbitrary code with
    the privileges of the user invoking Firefox. (CVE-2011-2374, CVE-2011-2375)
    
    Martin Barbella discovered that under certain conditions, viewing a XUL
    document while JavaScript was disabled caused deleted memory to be
    accessed. An attacker could potentially use this to crash Firefox or
    execute arbitrary code with the privileges of the user invoking Firefox.
    (CVE-2011-2373)
    
    Jordi Chancel discovered a vulnerability on multipart/x-mixed-replace
    images due to memory corruption. An attacker could potentially use this to
    crash Firefox or execute arbitrary code with the privileges of the user
    invoking Firefox. (CVE-2011-2377)
    
    Chris Rohlf and Yan Ivnitskiy discovered an integer overflow vulnerability
    in JavaScript Arrays. An attacker could potentially use this to execute
    arbitrary code with the privileges of the user invoking Firefox.
    (CVE-2011-2371)
    
    It was discovered that Firefox's WebGL textures did not honor same-origin
    policy. If a user were tricked into viewing a malicious site, an attacker
    could potentially view image data from a different site. (CVE-2011-2366)
    
    Christoph Diehl discovered an out-of-bounds read vulnerability in WebGL
    code. An attacker could potentially read data that other processes had
    stored in the GPU. (CVE-2011-2367)
    
    Christoph Diehl discovered an invalid write vulnerability in WebGL code. An
    attacker could potentially use this to execute arbitrary code with the
    privileges of the user invoking Firefox. (CVE-2011-2368)
    
    It was discovered that an unauthorized site could trigger an installation
    dialog for addons and themes. If a user were tricked into viewing a
    malicious site, an attacker could possibly trick the user into installing a
    malicious addon or theme. (CVE-2011-2370)
    
    Mario Heiderich discovered a vulnerability in displaying decoded
    HTML-encoded entities inside SVG elements. An attacker could utilize this
    to perform cross-site scripting attacks. (CVE-2011-2369)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 11.04:
      firefox                         5.0+build1+nobinonly-0ubuntu0.11.04.1
    
    After a standard system update you need to restart Firefox to make
    all the necessary changes.
    
    References:
      CVE-2011-2366, CVE-2011-2367, CVE-2011-2368, CVE-2011-2369,
      CVE-2011-2370, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374,
      CVE-2011-2375, CVE-2011-2377
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/5.0+build1+nobinonly-0ubuntu0.11.04.1
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"36","type":"x","order":"1","pct":50.7,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":14.08,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":35.21,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.