Synopsis: Critical: firefox security update Advisory ID: SLSA-2014:1919-1 Issue Date: 2014-12-02 CVE Numbers: CVE-2014-1587 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 CVE-2014-1594 -- Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593) A flaw was found in the Alarm API, which could allow applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass the same-origin policy. (CVE-2014-1594) This update disables SSL 3.0 support by default in Firefox. Details on how to re-enable SSL 3.0 support are available at: After installing the update, Firefox must be restarted for the changes to take effect. -- SL5 x86_64 firefox-31.3.0-4.el5_11.i386.rpm firefox-31.3.0-4.el5_11.x86_64.rpm firefox-debuginfo-31.3.0-4.el5_11.i386.rpm firefox-debuginfo-31.3.0-4.el5_11.x86_64.rpm i386 firefox-31.3.0-4.el5_11.i386.rpm firefox-debuginfo-31.3.0-4.el5_11.i386.rpm SL6 x86_64 firefox-31.3.0-3.el6_6.x86_64.rpm firefox-debuginfo-31.3.0-3.el6_6.x86_64.rpm firefox-31.3.0-3.el6_6.i686.rpm firefox-debuginfo-31.3.0-3.el6_6.i686.rpm i386 firefox-31.3.0-3.el6_6.i686.rpm firefox-debuginfo-31.3.0-3.el6_6.i686.rpm SL7 x86_64 firefox-31.3.0-3.el7_0.x86_64.rpm firefox-debuginfo-31.3.0-3.el7_0.x86_64.rpm firefox-31.3.0-3.el7_0.i686.rpm firefox-debuginfo-31.3.0-3.el7_0.i686.rpm - Scientific Linux Development Team