Security researchers Thai Duong and Juliano Rizzo reported that SPDY's request header compression leads to information leakage, which can allow the extraction of private data such as session cookies, even over an encrypted SSL connection. Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=779413
Red Hat Enterprise Linux 5 and 6 currently contain Mozilla Firefox version 10.0.x ESR. Those versions: - do not request the use of zlib compression in the SSL/TLS protocol - do not support SPDY protocol (See bug 857051, comment 4 and bug 857737 for more details). Statement: This issue did not affect the version of Firefox and Thunderbird packages as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the version of Firefox, Thunderbird and Seamonkey as shipped with Fedora-16 and Fedora-17. This issue was addressed via the following fedora security advisories which updates Firefox and Thunderbird to version 15.0 and seamonkey to version 2.12: Fedora-16: https://admin.fedoraproject.org/updates/FEDORA-2012-14086 https://admin.fedoraproject.org/updates/FEDORA-2012-14102 Fedora-17: https://admin.fedoraproject.org/updates/FEDORA-2012-14159 https://admin.fedoraproject.org/updates/FEDORA-2012-14049 Fedora-18: https://admin.fedoraproject.org/updates/FEDORA-2012-13888 https://admin.fedoraproject.org/updates/FEDORA-2012-13897
Mozilla security advisory: http://www.mozilla.org/security/announce/2012/mfsa2012-73.html The assignment is a duplicate of the Mitre assigned CVE-2012-4930. *** This bug has been marked as a duplicate of bug 857737 ***