Описание
ELSA-2010-0547: firefox security update (CRITICAL)
firefox:
[3.6.7-2.0.1.el5]
- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html and remove the corresponding Red Hat ones
[3.6.7-2]
- Update to 3.6.7 beta2
[3.6.7-1]
- Update to 3.6.7
[3.6.4-9]
- Fixed rhbz#531159 - default browser check
xulrunner:
[1.9.2.7-2.0.1.el5]
- Added xulrunner-oracle-default-prefs.js and removed the corresponding RedHat one.
[1.9.2.7-2]
- Update to build 2
[1.9.2.7-1]
- Update to 1.9.2.7
[1.9.2.4-10]
- Fix a file dependency issue
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
firefox
3.6.7-2.0.1.el5
xulrunner
1.9.2.7-2.0.1.el5
xulrunner-devel
1.9.2.7-2.0.1.el5
Oracle Linux x86_64
firefox
3.6.7-2.0.1.el5
xulrunner
1.9.2.7-2.0.1.el5
xulrunner-devel
1.9.2.7-2.0.1.el5
Oracle Linux i386
firefox
3.6.7-2.0.1.el5
xulrunner
1.9.2.7-2.0.1.el5
xulrunner-devel
1.9.2.7-2.0.1.el5
Ссылки на источники
Связанные уязвимости
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x befo ...
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.