Synopsis:          Critical: firefox security update
Advisory ID:       SLSA-2014:1919-1
Issue Date:        2014-12-02
CVE Numbers:       CVE-2014-1587
                   CVE-2014-1590
                   CVE-2014-1592
                   CVE-2014-1593
                   CVE-2014-1594
--

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592,
CVE-2014-1593)

A flaw was found in the Alarm API, which could allow applications to
schedule actions to be run in the future. A malicious web application
could use this flaw to bypass the same-origin policy. (CVE-2014-1594)

This update disables SSL 3.0 support by default in Firefox. Details on how
to re-enable SSL 3.0 support are available at:

After installing the update, Firefox must be restarted for the changes
to take effect.
--

SL5
  x86_64
    firefox-31.3.0-4.el5_11.i386.rpm
    firefox-31.3.0-4.el5_11.x86_64.rpm
    firefox-debuginfo-31.3.0-4.el5_11.i386.rpm
    firefox-debuginfo-31.3.0-4.el5_11.x86_64.rpm
  i386
    firefox-31.3.0-4.el5_11.i386.rpm
    firefox-debuginfo-31.3.0-4.el5_11.i386.rpm
SL6
  x86_64
    firefox-31.3.0-3.el6_6.x86_64.rpm
    firefox-debuginfo-31.3.0-3.el6_6.x86_64.rpm
    firefox-31.3.0-3.el6_6.i686.rpm
    firefox-debuginfo-31.3.0-3.el6_6.i686.rpm
  i386
    firefox-31.3.0-3.el6_6.i686.rpm
    firefox-debuginfo-31.3.0-3.el6_6.i686.rpm
SL7
  x86_64
    firefox-31.3.0-3.el7_0.x86_64.rpm
    firefox-debuginfo-31.3.0-3.el7_0.x86_64.rpm
    firefox-31.3.0-3.el7_0.i686.rpm
    firefox-debuginfo-31.3.0-3.el7_0.i686.rpm

- Scientific Linux Development Team