Crashes with evidence of memory corruption (CVE-2006-1738, CVE-2006-1739) As part of the Firefox 1.5 release we fixed several crash bugs to improve the stability of the product. Some of these crashes showed evidence of memory corruption that we presume could be exploited to run arbitrary code and have been applied to the Firefox 1.0.x and Mozilla Suite 1.7.x releases While fixing an unexploitable recursion-induced crash Bernd Mielke discovered that the CSS border-rendering code could potentially write past the end of an array. Alden D'Souza reported a crash when using an extremely large regular expression in JavaScript. This was tracked down to a 16-bit integer overflow that could potentially cause the browser to interpret attacker supplied data as JavaScript bytecode. Martijn Wargers fixed two potentially exploitable crashes when programmatically changing the -moz-grid and -moz-grid-group display styles. Note: Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail. CVE-2006-1737 bug 280769 CVE-2006-1738 bugs 311710, 313173 CVE-2006-1739 bug 265736 Workaround Upgrade to the fixed versions. Do not enable JavaScript in Thunderbird or the mail portions of SeaMonkey and the Mozilla Suite. References [1]https://bugzilla.mozilla.org/show_bug.cgi?id=265736 [2]https://bugzilla.mozilla.org/show_bug.cgi?id=280769 [3]https://bugzilla.mozilla.org/show_bug.cgi?id=311710 [4]https://bugzilla.mozilla.org/show_bug.cgi?id=313173 [5]https://bugzilla.mozilla.org/show_bug.cgi?id=315304 This issue also affects FC4
Lifting embargo
This bug was fixed for FC4 in Fedora Update FEDORA-2006-488 <http://www.redhat.com/archives/fedora-package-announce/2006-May/msg00019.html>. This bug was fixed for FC5 in Fedora Update FEDORA-2006-487 <http://www.redhat.com/archives/fedora-package-announce/2006-May/msg00018.html>.