Описание
ELSA-2014-0448: firefox security update (CRITICAL)
[24.5.0-1.0.1]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one
- Build with nspr-devel >= 4.10.0 to fix build failure
[24.5.0-1]
- Update to 24.5.0 ESR
[24.4.0-3]
- Added a workaround for Bug 1054242 - RHEVM: Extremely high memory usage in Firefox 24 ESR on RHEL 6.5
[24.4.0-2]
- fixed rhbz#1067343 - Broken languagepack configuration after firefox update
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
firefox
24.5.0-1.0.1.el5_10
Oracle Linux x86_64
firefox
24.5.0-1.0.1.el5_10
Oracle Linux i386
firefox
24.5.0-1.0.1.el5_10
Oracle Linux 6
Oracle Linux x86_64
firefox
24.5.0-1.0.1.el6_5
Oracle Linux i686
firefox
24.5.0-1.0.1.el6_5
Ссылки на источники
Связанные уязвимости
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox ...