Описание
ELSA-2014-0310: firefox security update (CRITICAL)
[24.4.0-1.0.1]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one
- Build with nspr-devel >= 4.10.0 to fix build failure
[24.4.0-1]
- Update to 24.4.0 ESR
[24.3.0-4]
- Fixed rhbz#1070467 - Enable Add Ons by default in Firefox
[24.3.0-3]
- Fixed rhbz#1054832 - Firefox does not support Camellia cipher
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
firefox
24.4.0-1.0.1.el5_10
Oracle Linux x86_64
firefox
24.4.0-1.0.1.el5_10
Oracle Linux i386
firefox
24.4.0-1.0.1.el5_10
Oracle Linux 6
Oracle Linux x86_64
firefox
24.4.0-1.0.1.el6_5
Oracle Linux i686
firefox
24.4.0-1.0.1.el6_5
Ссылки на источники
Связанные уязвимости
The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ...