USN-1367-4: Xulrunner vulnerability
17 February 2012
Xulrunner based applications could be made to crash or run programs as your login if they opened a specially crafted file.
Releases
Packages
- xulrunner-1.9.2 - Mozilla Gecko runtime environment
Details
USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding
update for Xulrunner.
Original advisory details:
Jueri Aedla discovered that libpng did not properly verify the size used
when allocating memory during chunk decompression. If a user or automated
system using libpng were tricked into opening a specially crafted image,
an attacker could exploit this to cause a denial of service or execute
code with the privileges of the user invoking the program. (CVE-2011-3026)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.10
Ubuntu 10.04
After a standard system update you need to restart any application based on
Xulrunner such as Yelp or Conkeror to make all the necessary changes.
References
Related notices
- USN-1367-1: libpng, libpng12-0
- USN-1367-3: thunderbird
- USN-1367-2: firefox