{"id":"RHSA-2012:1088","summary":"Red Hat Security Advisory: firefox security update","modified":"2025-11-22T10:38:15Z","published":"2024-09-22T16:00:58Z","upstream":["CVE-2012-1948","CVE-2012-1950","CVE-2012-1951","CVE-2012-1952","CVE-2012-1953","CVE-2012-1954","CVE-2012-1955","CVE-2012-1957","CVE-2012-1958","CVE-2012-1959","CVE-2012-1961","CVE-2012-1962","CVE-2012-1963","CVE-2012-1964","CVE-2012-1965","CVE-2012-1966","CVE-2012-1967"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2012:1088"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html"},{"type":"ARTICLE","url":"https://rhn.redhat.com/errata/RHBA-2012-0337.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=838879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840201"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840203"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840206"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840207"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840225"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840259"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1088.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1948"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1948"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1948"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1950"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1951"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1952"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1953"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1953"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1953"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1954"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1954"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1954"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1955"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1955"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1955"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1957"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1957"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1957"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1958"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1958"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1958"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1959"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1959"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1959"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1961"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1961"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1961"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1962"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1962"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1962"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1963"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1963"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1963"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1964"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1965"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1965"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1965"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1966"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-1967"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-1967"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1967"}],"affected":[{"package":{"name":"firefox","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/firefox-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/firefox-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-2.el5_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/firefox-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/firefox-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/firefox-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"firefox-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/firefox-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/xulrunner"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/xulrunner-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}},{"package":{"name":"xulrunner-devel","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/xulrunner-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.0.6-1.el6_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1088.json"}}],"schema_version":"1.7.3"}