Red Hat 9062 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Critical: firefox security update
Advisory ID: RHSA-2006:0610-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0610.html
Issue date: 2006-07-28
Updated on: 2006-07-28
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-2779 CVE-2006-2780 CVE-2006-2783
CVE-2006-2782 CVE-2006-2778 CVE-2006-2776
CVE-2006-2784 CVE-2006-2785 CVE-2006-2786
CVE-2006-2787 CVE-2006-2788 CVE-2006-3801
CVE-2006-3677 CVE-2006-3113 CVE-2006-3802
CVE-2006-3803 CVE-2006-3805 CVE-2006-3806
CVE-2006-3807 CVE-2006-3808 CVE-2006-3809
CVE-2006-3810 CVE-2006-3811 CVE-2006-3812
- ---------------------------------------------------------------------

1. Summary:

Updated firefox packages that fix several security bugs are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mozilla Firefox is an open source Web browser.

The Mozilla Foundation has discontinued support for the Mozilla Firefox
1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in
Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox
1.5 branch.

This update also resolves a number of outstanding Firefox security issues:

Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-2776,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,
CVE-2006-3812)

Several denial of service flaws were found in the way Firefox processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running Firefox.
(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)

A cross-site scripting flaw was found in the way Firefox processed
Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web
page could execute a script within the browser that a web input sanitizer
could miss due to a malformed "script" tag. (CVE-2006-2783)

Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)

A form file upload flaw was found in the way Firefox handled javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction. (CVE-2006-2782)

A denial of service flaw was found in the way Firefox called the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded. (CVE-2006-2778)

Two HTTP response smuggling flaws were found in the way Firefox processed
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy
restrictions. (CVE-2006-2786)

A flaw was found in the way Firefox processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)

A double free flaw was found in the way the nsIX509::getRawDER method was
called. If a victim visited a carefully crafted web page, it was possible
to execute arbitrary code as the user running Firefox. (CVE-2006-2788)

Users of Firefox are advised to upgrade to this update, which contains
Firefox version 1.5.0.5 that corrects these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

193895 - CVE-2006-2779 multiple firefox DoS issues (CVE-2006-2780)
196973 - CVE-2006-2783 multiple Firefox issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788)
200168 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

ppc:
27c343290fd4c6fcf16323cd62f02e9b firefox-1.5.0.5-0.el4.1.ppc.rpm
be5c0e93af729117a3c7153e58d50183 firefox-debuginfo-1.5.0.5-0.el4.1.ppc.rpm

s390:
4be9436cc0d3cb1daee6f6962fb894ec firefox-1.5.0.5-0.el4.1.s390.rpm
4348ba2ef6e30a3e01137492373b6b11 firefox-debuginfo-1.5.0.5-0.el4.1.s390.rpm

s390x:
ddbb5e0ae4707724e08422de346aaedf firefox-1.5.0.5-0.el4.1.s390x.rpm
db4a001815e2c6096122248ae9a22a4b firefox-debuginfo-1.5.0.5-0.el4.1.s390x.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.5-0.el4.1.src.rpm
6b7faea0461d07518bd00000001a4bbe firefox-1.5.0.5-0.el4.1.src.rpm

i386:
93a78aeae71078e700fe06be36e33c8a firefox-1.5.0.5-0.el4.1.i386.rpm
15b00feee0fa331ff49b6c42900ec907 firefox-debuginfo-1.5.0.5-0.el4.1.i386.rpm

ia64:
29ae3f60c50462267765855063edddf4 firefox-1.5.0.5-0.el4.1.ia64.rpm
a2e18536c14f09611d49276b9af8ffa8 firefox-debuginfo-1.5.0.5-0.el4.1.ia64.rpm

x86_64:
d523fd14b4efd77944a75f80c400f37b firefox-1.5.0.5-0.el4.1.x86_64.rpm
bed1b30a94f7d92ee75b819bce7b55bf firefox-debuginfo-1.5.0.5-0.el4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEyqjvXlSAg2UNWIIRAht1AJ9/F6OyTVsnPHg3L8cf/9cJVfWmcQCbB9PA
7Tf3o4tdkJLNwMai8JUDDkc=
=GX9n
-----END PGP SIGNATURE-----