Описание
ELSA-2011-0310: firefox security and bug fix update (CRITICAL)
firefox:
[3.6.14-4.0.1.el6_0]
- Added firefox-oracle-default-prefs.js and removed firefox-redhat-default-prefs.js
[3.6.14-4]
- Update to build3
[3.6.14-3]
- Update to build2
[3.6.14-2]
- Update to 3.6.14
xulrunner:
[1.9.2.14-3.0.1.el6_0]
- Added xulrunner-oracle-default-prefs.js and removed the corresponding RedHat one. Bug#11487
[1.9.2.14-3]
- Update to build3
[1.9.2.14-2]
- Update to build2
[1.9.2.14-1]
- Update to 1.9.2.14
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
firefox
3.6.14-4.0.1.el5_6
xulrunner
1.9.2.14-4.0.1.el5_6
xulrunner-devel
1.9.2.14-4.0.1.el5_6
Oracle Linux i386
firefox
3.6.14-4.0.1.el5_6
xulrunner
1.9.2.14-4.0.1.el5_6
xulrunner-devel
1.9.2.14-4.0.1.el5_6
Oracle Linux 6
Oracle Linux x86_64
firefox
3.6.14-4.0.1.el6_0
xulrunner
1.9.2.14-3.0.1.el6_0
xulrunner-devel
1.9.2.14-3.0.1.el6_0
Oracle Linux i686
firefox
3.6.14-4.0.1.el6_0
xulrunner
1.9.2.14-3.0.1.el6_0
xulrunner-devel
1.9.2.14-3.0.1.el6_0
Ссылки на источники
Связанные уязвимости
Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.
Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.
Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.
Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6. ...
Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.