Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. Reference: http://www.mozilla.org/security/announce/2012/mfsa2012-34.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:0710 https://rhn.redhat.com/errata/RHSA-2012-0710.html
This came through as well; adding it here due to the relation to CVE-2011-3101: Common Vulnerabilities and Exposures assigned an identifier CVE-2012-3105 to the following vulnerability: Name: CVE-2012-3105 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3105 Assigned: 20120605 Reference: http://www.mozilla.org/security/announce/2012/mfsa2012-34.html Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=744888 The glBufferData function in the WebGL implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not properly mitigate an unspecified flaw in an NVIDIA driver, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a related issue to CVE-2011-3101.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 Via RHSA-2012:0715 https://rhn.redhat.com/errata/RHSA-2012-0715.html