Red Hat Bugzilla – Bug 615472
CVE-2010-1207 Mozilla Same-origin bypass using canvas context
Last modified: 2013-04-12 14:50:46 EDT
Mozilla developer Vladimir Vukicevic reported that a canvas element can be
used to read data from another site, violating the same-origin policy. The
read restriction placed on a canvas element which has had cross-origin data
rendered into it can be bypassed by retaining a reference to the canvas
element's context and deleting the associated canvas node from the DOM.
This is now public: http://www.mozilla.org/security/announce/2010/mfsa2010-43.html
This issue has been addressed in following products:
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 5
Via RHSA-2010:0547 https://rhn.redhat.com/errata/RHSA-2010-0547.html
xulrunner-184.108.40.206-1.fc13, firefox-3.6.7-1.fc13, mozvoikko-1.0-12.fc13, gnome-web-photo-0.9-10.fc13, perl-Gtk2-MozEmbed-0.08-6.fc13.15, gnome-python2-extras-2.25.3-20.fc13, galeon-2.0.7-30.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.
thunderbird-3.1.1-1.fc13, sunbird-1.0-0.26.b2pre.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.