Описание
ELSA-2011-0885: firefox security and bug fix update (CRITICAL)
firefox:
[3.6.18-1.0.1.el6_1]
- Added firefox-oracle-default-prefs.js and removed firefox-redhat-default-prefs.js
[3.6.18-1]
- Update to 3.6.18
xulrunner:
[1.9.2.18-2.0.1.el6_1]
- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js
[1.9.2.18-2]
- Update to 1.9.2.18
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
firefox
3.6.18-1.0.1.el5_6
xulrunner
1.9.2.18-2.0.1.el5_6
xulrunner-devel
1.9.2.18-2.0.1.el5_6
Oracle Linux x86_64
firefox
3.6.18-1.0.1.el5_6
xulrunner
1.9.2.18-2.0.1.el5_6
xulrunner-devel
1.9.2.18-2.0.1.el5_6
Oracle Linux i386
firefox
3.6.18-1.0.1.el5_6
xulrunner
1.9.2.18-2.0.1.el5_6
xulrunner-devel
1.9.2.18-2.0.1.el5_6
Oracle Linux 6
Oracle Linux x86_64
firefox
3.6.18-1.0.1.el6_1
xulrunner
1.9.2.18-2.0.1.el6_1
xulrunner-devel
1.9.2.18-2.0.1.el6_1
Oracle Linux i686
firefox
3.6.18-1.0.1.el6_1
xulrunner
1.9.2.18-2.0.1.el6_1
xulrunner-devel
1.9.2.18-2.0.1.el6_1
Ссылки на источники
Связанные уязвимости
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
Use-after-free vulnerability in the nsXULCommandDispatcher function in ...