Chapter 1. Package Updates
60
A flaw was found in the way Firefox handles malformed JavaScript. A website with an object
containing malicious JavaScript could execute that JavaScript with the privileges of the user running
Firefox. (
CVE-2009-3079
385
)
Descriptions in the dialogs when adding and removing PKCS #11 modules were not informative. An
attacker able to trick a user into installing a malicious PKCS #11 module could use this flaw to install
their own Certificate Authority certificates on a user's machine, making it possible to trick the user into
believing they are viewing a trusted site or, potentially, execute arbitrary code with the privileges of the
user running Firefox. (
CVE-2009-3076
386
)
A flaw was found in the way Firefox displays the address bar when window.open() is called in a certain
way. An attacker could use this flaw to conceal a malicious URL, possibly tricking a user into believing
they are viewing a trusted site. (
CVE-2009-2654
387
)
A flaw was found in the way Firefox displays certain Unicode characters. An attacker could use this
flaw to conceal a malicious URL, possibly tricking a user into believing they are viewing a trusted site.
(
CVE-2009-3078
388
)
For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.0.14.
You can find a link to the Mozilla advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.14,
which corrects these issues. After installing the update, Firefox must be restarted for the changes to
take effect.
1.55. firstboot
1.55.1. RHBA-2010:0314: bug fix update
Updated firstboot packages that fix a bug are now available.
The firstboot utility runs after installation. It guides the user through a series of steps that allows for
easier configuration of the machine.
These updated packages address the following issue:
* Clicking [Change Network Configuration] from firstboot's network configuration page launched a
separate network configuration window. If the user then clicked [Forward] on the still-visible main
window, the separate configuration window became hidden behind the full-screen main window.
Further mouse-clicks would be ineffectual and it could appear to the user that the system had become
unresponsive. It was necessary to use the alt+tab keys to reveal the hidden configuration window.
Code has been added to the networking.py source file to modify the behavior of the network
configuration and main windows. Now the configuration window will stay on top if the user clicks
outside its boundary. (
BZ#511984
389
)
Users are advised to upgrade to these updated packages, which resolve this issue.
385
https://www.redhat.com/security/data/cve/CVE-2009-3079.html
386
https://www.redhat.com/security/data/cve/CVE-2009-3076.html
387
https://www.redhat.com/security/data/cve/CVE-2009-2654.html
388
https://www.redhat.com/security/data/cve/CVE-2009-3078.html
389
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=511984
Содержание ENTERPRISE LINUX 5.5 - S 2010
Страница 10: ...x ...
Страница 308: ...298 ...
Страница 310: ...300 ...
Страница 468: ...458 ...
Страница 470: ...460 ...