ELSA-2019-3193

ELSA-2019-3193 - firefox security update

Type:SECURITY
Impact:CRITICAL
Release Date:2019-10-23

Description


[68.2.0-1.0.1]
- Update distribution for Oracle Linux [Orabug: 30143292]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file

[68.2.0-1]
- Update to 68.2.0 ESR

[68.1.0-6]
- Enable system nss on RHEL6


Related CVEs


CVE-2019-11758
CVE-2019-11761
CVE-2019-11764
CVE-2019-11757
CVE-2019-11759
CVE-2019-11760
CVE-2019-11763
CVE-2019-11762

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) firefox-68.2.0-1.0.1.el7_7.src.rpm11598412ae7559329dbcff2ca1ac24bbd9bdc6e6b1874d52ec97648c7bea5662ELSA-2025-2699ol7_aarch64_latest
firefox-68.2.0-1.0.1.el7_7.src.rpm11598412ae7559329dbcff2ca1ac24bbd9bdc6e6b1874d52ec97648c7bea5662ELSA-2025-2699ol7_aarch64_u7_patch
firefox-68.2.0-1.0.1.el7_7.aarch64.rpma3237f85480bc024b016580784c4d0d3d08426654d1cab17dbabd0c10b8c2487ELSA-2025-2699ol7_aarch64_latest
firefox-68.2.0-1.0.1.el7_7.aarch64.rpma3237f85480bc024b016580784c4d0d3d08426654d1cab17dbabd0c10b8c2487ELSA-2025-2699ol7_aarch64_u7_patch
Oracle Linux 7 (x86_64) firefox-68.2.0-1.0.1.el7_7.src.rpm11598412ae7559329dbcff2ca1ac24bbd9bdc6e6b1874d52ec97648c7bea5662ELSA-2025-2699ol7_x86_64_latest
firefox-68.2.0-1.0.1.el7_7.src.rpm11598412ae7559329dbcff2ca1ac24bbd9bdc6e6b1874d52ec97648c7bea5662ELSA-2025-2699ol7_x86_64_optional_latest
firefox-68.2.0-1.0.1.el7_7.src.rpm11598412ae7559329dbcff2ca1ac24bbd9bdc6e6b1874d52ec97648c7bea5662ELSA-2025-2699ol7_x86_64_u7_patch
firefox-68.2.0-1.0.1.el7_7.i686.rpmf942cb3692f54d78d5e877a92fd1261f835ebe208b2cfcbd74e40c0bb3585991ELSA-2025-2699ol7_x86_64_optional_latest
firefox-68.2.0-1.0.1.el7_7.x86_64.rpmcdce3cbf05405ccf72bf3ec406dae28b4d9f9d090fb2b93814e869cd154999eaELSA-2025-2699ol7_x86_64_latest
firefox-68.2.0-1.0.1.el7_7.x86_64.rpmcdce3cbf05405ccf72bf3ec406dae28b4d9f9d090fb2b93814e869cd154999eaELSA-2025-2699ol7_x86_64_u7_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete