ELSA-2014-0310

ELSA-2014-0310 - firefox security update

Type:SECURITY
Impact:CRITICAL
Release Date:2014-03-18

Description


[24.4.0-1.0.1]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one
- Build with nspr-devel >= 4.10.0 to fix build failure

[24.4.0-1]
- Update to 24.4.0 ESR

[24.3.0-4]
- Fixed rhbz#1070467 - Enable Add Ons by default in Firefox

[24.3.0-3]
- Fixed rhbz#1054832 - Firefox does not support Camellia cipher


Related CVEs


CVE-2014-1505
CVE-2014-1510
CVE-2014-1514
CVE-2014-1493
CVE-2014-1497
CVE-2014-1508
CVE-2014-1509
CVE-2014-1511
CVE-2014-1512
CVE-2014-1513

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) firefox-24.4.0-1.0.1.el5_10.src.rpmdd1287630f9b73230e2f82a6cf4a0eed78621a23a6501edabeebef33bbcd6606ELSA-2017-0459ol5_i386_latest
firefox-24.4.0-1.0.1.el5_10.src.rpmdd1287630f9b73230e2f82a6cf4a0eed78621a23a6501edabeebef33bbcd6606ELSA-2017-0459ol5_u10_i386_patch
firefox-24.4.0-1.0.1.el5_10.i386.rpm4ea7ff1b907a800e465e4628b11371e976034e51cdc849a7981759826612cb25ELSA-2017-0459ol5_i386_latest
firefox-24.4.0-1.0.1.el5_10.i386.rpm4ea7ff1b907a800e465e4628b11371e976034e51cdc849a7981759826612cb25ELSA-2017-0459ol5_u10_i386_patch
Oracle Linux 5 (ia64) firefox-24.4.0-1.0.1.el5_10.src.rpmdd1287630f9b73230e2f82a6cf4a0eed78621a23a6501edabeebef33bbcd6606ELSA-2017-0459ol5_ia64_latest
firefox-24.4.0-1.0.1.el5_10.src.rpmdd1287630f9b73230e2f82a6cf4a0eed78621a23a6501edabeebef33bbcd6606ELSA-2017-0459ol5_u10_ia64_patch
firefox-24.4.0-1.0.1.el5_10.ia64.rpm6ca1d46168158069df730631ccd3c7444eef3afd6a0ee0477b0f97c3dd72d0faELSA-2017-0459ol5_ia64_latest
firefox-24.4.0-1.0.1.el5_10.ia64.rpm6ca1d46168158069df730631ccd3c7444eef3afd6a0ee0477b0f97c3dd72d0faELSA-2017-0459ol5_u10_ia64_patch
Oracle Linux 5 (x86_64) firefox-24.4.0-1.0.1.el5_10.src.rpmdd1287630f9b73230e2f82a6cf4a0eed78621a23a6501edabeebef33bbcd6606ELSA-2017-0459ol5_u10_x86_64_patch
firefox-24.4.0-1.0.1.el5_10.src.rpmdd1287630f9b73230e2f82a6cf4a0eed78621a23a6501edabeebef33bbcd6606ELSA-2017-0459ol5_x86_64_latest
firefox-24.4.0-1.0.1.el5_10.i386.rpm4ea7ff1b907a800e465e4628b11371e976034e51cdc849a7981759826612cb25ELSA-2017-0459ol5_u10_x86_64_patch
firefox-24.4.0-1.0.1.el5_10.i386.rpm4ea7ff1b907a800e465e4628b11371e976034e51cdc849a7981759826612cb25ELSA-2017-0459ol5_x86_64_latest
firefox-24.4.0-1.0.1.el5_10.x86_64.rpme3b9e28a01b4a999ce214690d5addfa33e0ff4faa2561ce981d027d2bbe1f591ELSA-2017-0459ol5_u10_x86_64_patch
firefox-24.4.0-1.0.1.el5_10.x86_64.rpme3b9e28a01b4a999ce214690d5addfa33e0ff4faa2561ce981d027d2bbe1f591ELSA-2017-0459ol5_x86_64_latest
Oracle Linux 6 (i386) firefox-24.4.0-1.0.1.el6_5.src.rpm29ea778e9d52b1f9e028354c39c1968cfeb7b31eeb8d10c74ca66cdc917230d9ELSA-2020-5257ol6_i386_latest_archive
firefox-24.4.0-1.0.1.el6_5.src.rpm29ea778e9d52b1f9e028354c39c1968cfeb7b31eeb8d10c74ca66cdc917230d9ELSA-2020-5257ol6_u5_i386_patch
firefox-24.4.0-1.0.1.el6_5.i686.rpm0ab03defa2c36b69d6168c5f692a46cf8d48d48a19a2b2ff0d81d30ff80dff4eELSA-2020-5257ol6_i386_latest_archive
firefox-24.4.0-1.0.1.el6_5.i686.rpm0ab03defa2c36b69d6168c5f692a46cf8d48d48a19a2b2ff0d81d30ff80dff4eELSA-2020-5257ol6_u5_i386_patch
Oracle Linux 6 (x86_64) firefox-24.4.0-1.0.1.el6_5.src.rpm29ea778e9d52b1f9e028354c39c1968cfeb7b31eeb8d10c74ca66cdc917230d9ELSA-2020-5257ol6_u5_x86_64_patch
firefox-24.4.0-1.0.1.el6_5.src.rpm29ea778e9d52b1f9e028354c39c1968cfeb7b31eeb8d10c74ca66cdc917230d9ELSA-2020-5257ol6_x86_64_latest_archive
firefox-24.4.0-1.0.1.el6_5.i686.rpm0ab03defa2c36b69d6168c5f692a46cf8d48d48a19a2b2ff0d81d30ff80dff4eELSA-2020-5257ol6_u5_x86_64_patch
firefox-24.4.0-1.0.1.el6_5.i686.rpm0ab03defa2c36b69d6168c5f692a46cf8d48d48a19a2b2ff0d81d30ff80dff4eELSA-2020-5257ol6_x86_64_latest_archive
firefox-24.4.0-1.0.1.el6_5.x86_64.rpmb624d0ed892a70ad4437ebfffa0b3c8e1a65b72a098f5800a5d70ae9af2907cfELSA-2020-5257ol6_u5_x86_64_patch
firefox-24.4.0-1.0.1.el6_5.x86_64.rpmb624d0ed892a70ad4437ebfffa0b3c8e1a65b72a098f5800a5d70ae9af2907cfELSA-2020-5257ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete