Date: Wed, 3 Dec 2014 19:39:37 +0000 Reply-To: scientific-linux-users@listserv.fnal.gov Sender: Security Errata for Scientific LinuxFrom: Pat Riehecky Subject: Security ERRATA Critical: firefox on SL5.x, SL6.x, SL7.x i386/x86_64 MIME-Version: 1.0 Synopsis: Critical: firefox security update Advisory ID: SLSA-2014:1919-1 Issue Date: 2014-12-02 CVE Numbers: CVE-2014-1587 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 CVE-2014-1594 -- Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593) A flaw was found in the Alarm API, which could allow applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass the same-origin policy. (CVE-2014-1594) This update disables SSL 3.0 support by default in Firefox. Details on how to re-enable SSL 3.0 support are available at: After installing the update, Firefox must be restarted for the changes to take effect. -- SL5 x86_64 firefox-31.3.0-4.el5_11.i386.rpm firefox-31.3.0-4.el5_11.x86_64.rpm firefox-debuginfo-31.3.0-4.el5_11.i386.rpm firefox-debuginfo-31.3.0-4.el5_11.x86_64.rpm i386 firefox-31.3.0-4.el5_11.i386.rpm firefox-debuginfo-31.3.0-4.el5_11.i386.rpm SL6 x86_64 firefox-31.3.0-3.el6_6.x86_64.rpm firefox-debuginfo-31.3.0-3.el6_6.x86_64.rpm firefox-31.3.0-3.el6_6.i686.rpm firefox-debuginfo-31.3.0-3.el6_6.i686.rpm i386 firefox-31.3.0-3.el6_6.i686.rpm firefox-debuginfo-31.3.0-3.el6_6.i686.rpm SL7 x86_64 firefox-31.3.0-3.el7_0.x86_64.rpm firefox-debuginfo-31.3.0-3.el7_0.x86_64.rpm firefox-31.3.0-3.el7_0.i686.rpm firefox-debuginfo-31.3.0-3.el7_0.i686.rpm - Scientific Linux Development Team