Описание
ELSA-2013-0614: xulrunner security update (CRITICAL)
[17.0.3-2.0.1.el6_4]
- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js
- Removed XULRUNNER_VERSION from SOURCE21
[17.0.3-2]
- Added fix for #848644
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
xulrunner
17.0.3-2.0.1.el5_9
xulrunner-devel
17.0.3-2.0.1.el5_9
Oracle Linux x86_64
xulrunner
17.0.3-2.0.1.el5_9
xulrunner-devel
17.0.3-2.0.1.el5_9
Oracle Linux i386
xulrunner
17.0.3-2.0.1.el5_9
xulrunner-devel
17.0.3-2.0.1.el5_9
Oracle Linux 6
Oracle Linux x86_64
xulrunner
17.0.3-2.0.1.el6_4
xulrunner-devel
17.0.3-2.0.1.el6_4
Oracle Linux i686
xulrunner
17.0.3-2.0.1.el6_4
xulrunner-devel
17.0.3-2.0.1.el6_4
Связанные CVE
Связанные уязвимости
Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
Use-after-free vulnerability in the nsEditor::IsPreformatted function ...
Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.