Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-0988

Опубликовано: 13 мая 2015
Источник: oracle-oval
Платформа: Oracle Linux 7
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2015-0988: firefox security update (CRITICAL)

[38.0-3.0.1.el7_1]

  • Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file

[38.0-3]

  • Enabled system nss
  • Removed unused patches

[38.0-2]

  • Update to 38.0 ESR

[38.0b8-0.11]

  • Update to 38.0 Beta 8

[38.0b6-0.10]

  • Added patch for mozbz#1152515

[38.0b6-0.9]

  • Update to 38.0 Beta 6

[38.0b5-0.8]

  • Update to 38.0 Beta 5

[38.0b3-0.7]

  • Update to 38.0 Beta 3

[38.0b1-0.6]

  • Added patch for mozbz#1152391

[38.0b1-0.5]

  • Fix build on AArch64 (based on upstream skia changes)

[38.0b1-0.4]

  • Enabled debug build

[38.0b1-1]

  • Update to 38.0b1

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

firefox

38.0-3.0.1.el7_1

Oracle Linux 5

Oracle Linux x86_64

firefox

38.0-4.0.1.el5_11

Oracle Linux i386

firefox

38.0-4.0.1.el5_11

Oracle Linux 6

Oracle Linux x86_64

firefox

38.0-4.0.1.el6_6

Oracle Linux i686

firefox

38.0-4.0.1.el6_6

Связанные уязвимости

suse-cvrf
больше 10 лет назад

Security update for MozillaFirefox

suse-cvrf
больше 10 лет назад

Security update for MozillaFirefox

oracle-oval
больше 10 лет назад

ELSA-2015-1012: thunderbird security update (IMPORTANT)

ubuntu
больше 10 лет назад

Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.

redhat
больше 10 лет назад

Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.