Описание
ELSA-2014-1144: firefox security update (CRITICAL)
firefox [24.8.0-1.0.1.el7_0]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one
[24.8.0-1]
- Update to 24.8.0 ESR
xulrunner [24.8.0-1.0.1.el7_0]
- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js
- Removed XULRUNNER_VERSION from SOURCE21
[24.8.0-1]
- Update to 24.8.0 ESR
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
firefox
24.8.0-1.0.1.el6_5
Oracle Linux i686
firefox
24.8.0-1.0.1.el6_5
Oracle Linux 7
Oracle Linux x86_64
firefox
24.8.0-1.0.1.el7_0
xulrunner
24.8.0-1.0.1.el7_0
xulrunner-devel
24.8.0-1.0.1.el7_0
Oracle Linux 5
Oracle Linux ia64
firefox
24.8.0-2.0.1.el5_10
Oracle Linux x86_64
firefox
24.8.0-2.0.1.el5_10
Oracle Linux i386
firefox
24.8.0-2.0.1.el5_10
Связанные CVE
Связанные уязвимости
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Fir ...