Описание
ELSA-2012-1361: xulrunner security update (CRITICAL)
[10.0.8-2.0.1.el6_3]
- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js
[10.0.8-2]
- Added patches from 10.0.9 ESR
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
xulrunner
10.0.8-2.0.1.el5_8
xulrunner-devel
10.0.8-2.0.1.el5_8
Oracle Linux x86_64
xulrunner
10.0.8-2.0.1.el5_8
xulrunner-devel
10.0.8-2.0.1.el5_8
Oracle Linux i386
xulrunner
10.0.8-2.0.1.el5_8
xulrunner-devel
10.0.8-2.0.1.el5_8
Oracle Linux 6
Oracle Linux x86_64
xulrunner
10.0.8-2.0.1.el6_3
xulrunner-devel
10.0.8-2.0.1.el6_3
Oracle Linux i686
xulrunner
10.0.8-2.0.1.el6_3
xulrunner-devel
10.0.8-2.0.1.el6_3
Связанные CVE
Связанные уязвимости
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunder ...
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.