Описание
ELSA-2008-0597: firefox security update (CRITICAL)
devhelp:
[0.12-18]
- Rebuild against xulrunner
firefox:
[3.0.1-1.0.1.el5]
- Replaced the RedHat prefs and bookmarks with Oracle prefs and bookmarks
- Add patch oracle-firefox-branding.patch
- Update firstrun URL
[3.0.1-1]
- Update to Firefox 3.0.1
xulrunner:
[1.9.0.1-1.0.1.el5]
- Added xulrunner-oracle-default-prefs.js
[1.9.0.1-1]
- Update to 1.9.0.1
yelp:
[2.16.0-20]
- rebuild against xulrunner
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
devhelp
0.12-18.el5
devhelp-devel
0.12-18.el5
firefox
3.0.1-1.0.1.el5
nspluginwrapper
0.9.91.5-22.el5
xulrunner
1.9.0.1-1.0.1.el5
xulrunner-devel
1.9.0.1-1.0.1.el5
xulrunner-devel-unstable
1.9.0.1-1.0.1.el5
yelp
2.16.0-20.el5
Oracle Linux i386
devhelp
0.12-18.el5
devhelp-devel
0.12-18.el5
firefox
3.0.1-1.0.1.el5
nspluginwrapper
0.9.91.5-22.el5
xulrunner
1.9.0.1-1.0.1.el5
xulrunner-devel
1.9.0.1-1.0.1.el5
xulrunner-devel-unstable
1.9.0.1-1.0.1.el5
yelp
2.16.0-20.el5
Связанные CVE
Связанные уязвимости
Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird befo ...
Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.