Red Hat Security Advisory 2015-1982-01

Red Hat Security Advisory 2015-1982-01 – Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A same-origin policy bypass flaw was found in the way Firefox handled certain cross-origin resource sharing requests. A web page containing malicious content could cause Firefox to disclose sensitive information.

CESA-2015:1982 Critical CentOS 6 firefox SecurityUpdate

CentOS Errata and Security Advisory 2015:1982 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1982.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
2b0500f8e67797c067512e493b6def2730ff342cfe25f5422b8eef976942ca51  firefox-38.4.0-1.el6.centos.i686.rpm

x86_64:
2b0500f8e67797c067512e493b6def2730ff342cfe25f5422b8eef976942ca51  firefox-38.4.0-1.el6.centos.i686.rpm
ad3552e15870db864b059640070725bd7975c763709f04ed1d4344344cde00d3  firefox-38.4.0-1.el6.centos.x86_64.rpm

Source:
f94e96d73f29b4af3820b876105f17485a9ec993a7fc502ccc3a26b71811e7fe  firefox-38.4.0-1.el6.centos.src.rpm



CESA-2015:1981 Critical CentOS 6 nspr SecurityUpdate

CentOS Errata and Security Advisory 2015:1981 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1981.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
4918a807ce01bae46183b6a1340c9df45625542a2ef912f305666dba8c60329b  nspr-4.10.8-2.el6_7.i686.rpm
e83bd8e8dc29a0a2913d47031309aefee083f603716d58f484155a97c17130e6  nspr-devel-4.10.8-2.el6_7.i686.rpm

x86_64:
4918a807ce01bae46183b6a1340c9df45625542a2ef912f305666dba8c60329b  nspr-4.10.8-2.el6_7.i686.rpm
bfdb7611d0a5f624f7193a504c12dbf44c863caf3077c5572bc485fb29ae6704  nspr-4.10.8-2.el6_7.x86_64.rpm
e83bd8e8dc29a0a2913d47031309aefee083f603716d58f484155a97c17130e6  nspr-devel-4.10.8-2.el6_7.i686.rpm
800d3997bca59552ab1d456edb511caa97fa4a6524e6bef133ea4adbf6cbcc3e  nspr-devel-4.10.8-2.el6_7.x86_64.rpm

Source:
999b3e49fd18fc6982167b3e4059fb770ca228060b832804b2857018417ec3e9  nspr-4.10.8-2.el6_7.src.rpm



CESA-2015:1981 Critical CentOS 6 nss SecurityUpdate

CentOS Errata and Security Advisory 2015:1981 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1981.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
e393b4dd10cbe47688991416f534c60cb02aac06c8e3e498a29ef773e05845ee  nss-3.19.1-5.el6_7.i686.rpm
cfcb3069f84af25d0d1c148f99cf2ad1b058dc614e010f8a8dce1071ab8d4612  nss-devel-3.19.1-5.el6_7.i686.rpm
5c7700f9089ea6deab51892d1dd8224e1d96b0af959f5e9fe14b052c1afd20da  nss-pkcs11-devel-3.19.1-5.el6_7.i686.rpm
c0ecd8ead0d3c89974f39d12f5eb2101c9191885bc80d69532d7dc2bc2a5f516  nss-sysinit-3.19.1-5.el6_7.i686.rpm
24cde93f943dbcaf41ed5194e486192bfb346aea9953a404dd637fb792a6d506  nss-tools-3.19.1-5.el6_7.i686.rpm

x86_64:
e393b4dd10cbe47688991416f534c60cb02aac06c8e3e498a29ef773e05845ee  nss-3.19.1-5.el6_7.i686.rpm
1e26eb517f2c9ef4ea97906fac1a9b919feb69c202b2c8a455605138a8d28981  nss-3.19.1-5.el6_7.x86_64.rpm
cfcb3069f84af25d0d1c148f99cf2ad1b058dc614e010f8a8dce1071ab8d4612  nss-devel-3.19.1-5.el6_7.i686.rpm
f255456bf67e8f90f210064d39a8b5a4d07334b55e3bed8a508660fe994eff77  nss-devel-3.19.1-5.el6_7.x86_64.rpm
5c7700f9089ea6deab51892d1dd8224e1d96b0af959f5e9fe14b052c1afd20da  nss-pkcs11-devel-3.19.1-5.el6_7.i686.rpm
2ac9273c152b431c54c0bdb56d5ffbd4254ae2126a0a413e7756f14fd44ac569  nss-pkcs11-devel-3.19.1-5.el6_7.x86_64.rpm
c0be3b628fd7076f5d3b76347d664ca2cd81ae69d7310f4518649be987a32042  nss-sysinit-3.19.1-5.el6_7.x86_64.rpm
dac61798795b0dd2389f4bddd05696508b903855f43f441da88b7aa740c3934e  nss-tools-3.19.1-5.el6_7.x86_64.rpm

Source:
95999daa348612d669a0fc66981e9cccc8dd64021b5bd558a84d351fb9204fc0  nss-3.19.1-5.el6_7.src.rpm



CESA-2015:1981 Critical CentOS 6 nss-utilSecurity Update

CentOS Errata and Security Advisory 2015:1981 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1981.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
2244ada80af9a50e7159f2b15d583c95d52a8fcf64bf24741a9ef43cae60ba7c  nss-util-3.19.1-2.el6_7.i686.rpm
6be5b41d00bbcc98eb2b2702835c7f10e87a43ac2b6242f1f4efffd55a779f3f  nss-util-devel-3.19.1-2.el6_7.i686.rpm

x86_64:
2244ada80af9a50e7159f2b15d583c95d52a8fcf64bf24741a9ef43cae60ba7c  nss-util-3.19.1-2.el6_7.i686.rpm
3050110e0f9737ecb291a6a3b5a4889454eb05785c6408ec8ab674e5491c2fd4  nss-util-3.19.1-2.el6_7.x86_64.rpm
6be5b41d00bbcc98eb2b2702835c7f10e87a43ac2b6242f1f4efffd55a779f3f  nss-util-devel-3.19.1-2.el6_7.i686.rpm
e71378f0cc7bb6efb1cbd83ce2ec269099031910a78c75cf3e9205a3ec26d742  nss-util-devel-3.19.1-2.el6_7.x86_64.rpm

Source:
29270259046ca34f5c7039c0ca5160e02a2877f1a074bf05d0060b56e5a1461b  nss-util-3.19.1-2.el6_7.src.rpm



Login Disable – Access Bypass – Moderately Critical – SA-CONTRIB-2015-162

Description

This module enables you to prevent existing users from logging in to your Drupal site unless they know the secret key to add to the end of the ?q=user login form page.

The Login Disable module doesn’t support other contributed user authentication modules like CAS or URL Login. When combined with those modules, the protection preventing a user from logging in does not work.

This vulnerability is mitigated by the fact that an attacker must already have a user account to log in. This bug therefore allows users to log in even if they do not have permission to login.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • Login Disable 6.x-1.x versions prior to 6.x-1.1.
  • Login Disable 7.x-1.x versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed Login Disable module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Login Disable project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: