Synopsis: Critical: firefox security update
Advisory ID: SLSA-2014:1919-1
Issue Date: 2014-12-02
CVE Numbers: CVE-2014-1587
CVE-2014-1590
CVE-2014-1592
CVE-2014-1593
CVE-2014-1594
—
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592,
CVE-2014-1593)
A flaw was found in the Alarm API, which could allow applications to
schedule actions to be run in the future. A malicious web application
could use this flaw to bypass the same-origin policy. (CVE-2014-1594)
This update disables SSL 3.0 support by default in Firefox. Details on how
to re-enable SSL 3.0 support are available at:
After installing the update, Firefox must be restarted for the changes
to take effect.
—
SL5
x86_64
firefox-31.3.0-4.el5_11.i386.rpm
firefox-31.3.0-4.el5_11.x86_64.rpm
firefox-debuginfo-31.3.0-4.el5_11.i386.rpm
firefox-debuginfo-31.3.0-4.el5_11.x86_64.rpm
i386
firefox-31.3.0-4.el5_11.i386.rpm
firefox-debuginfo-31.3.0-4.el5_11.i386.rpm
SL6
x86_64
firefox-31.3.0-3.el6_6.x86_64.rpm
firefox-debuginfo-31.3.0-3.el6_6.x86_64.rpm
firefox-31.3.0-3.el6_6.i686.rpm
firefox-debuginfo-31.3.0-3.el6_6.i686.rpm
i386
firefox-31.3.0-3.el6_6.i686.rpm
firefox-debuginfo-31.3.0-3.el6_6.i686.rpm
SL7
x86_64
firefox-31.3.0-3.el7_0.x86_64.rpm
firefox-debuginfo-31.3.0-3.el7_0.x86_64.rpm
firefox-31.3.0-3.el7_0.i686.rpm
firefox-debuginfo-31.3.0-3.el7_0.i686.rpm
– Scientific Linux Development Team