Content-Type: |
text/plain; charset="utf-8" |
Date: |
Wed, 4 Nov 2015 19:00:19 +0000 |
Reply-To: |
|
Subject: |
|
MIME-Version: |
1.0 |
Message-ID: |
|
Content-Transfer-Encoding: |
7bit |
Sender: |
|
From: |
|
Parts/Attachments: |
|
|
Synopsis: Critical: firefox security update
Advisory ID: SLSA-2015:1982-1
Issue Date: 2015-11-04
CVE Numbers: CVE-2015-4513
CVE-2015-7188
CVE-2015-7189
CVE-2015-7193
CVE-2015-7194
CVE-2015-7196
CVE-2015-7198
CVE-2015-7197
--
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7194,
CVE-2015-7196, CVE-2015-7198, CVE-2015-7197)
A same-origin policy bypass flaw was found in the way Firefox handled
certain cross-origin resource sharing (CORS) requests. A web page
containing malicious content could cause Firefox to disclose sensitive
information. (CVE-2015-7193)
A same-origin policy bypass flaw was found in the way Firefox handled URLs
containing IP addresses with white-space characters. This could lead to
cross-site scripting attacks. (CVE-2015-7188)
After installing the update, Firefox must be restarted for the changes
to take effect.
--
SL5
x86_64
firefox-38.4.0-1.el5_11.i386.rpm
firefox-38.4.0-1.el5_11.x86_64.rpm
firefox-debuginfo-38.4.0-1.el5_11.i386.rpm
firefox-debuginfo-38.4.0-1.el5_11.x86_64.rpm
i386
firefox-38.4.0-1.el5_11.i386.rpm
firefox-debuginfo-38.4.0-1.el5_11.i386.rpm
SL6
x86_64
firefox-38.4.0-1.el6_7.x86_64.rpm
firefox-debuginfo-38.4.0-1.el6_7.x86_64.rpm
firefox-38.4.0-1.el6_7.i686.rpm
firefox-debuginfo-38.4.0-1.el6_7.i686.rpm
i386
firefox-38.4.0-1.el6_7.i686.rpm
firefox-debuginfo-38.4.0-1.el6_7.i686.rpm
SL7
x86_64
firefox-38.4.0-1.el7_1.x86_64.rpm
firefox-debuginfo-38.4.0-1.el7_1.x86_64.rpm
firefox-38.4.0-1.el7_1.i686.rpm
firefox-debuginfo-38.4.0-1.el7_1.i686.rpm
- Scientific Linux Development Team
|
|
|