firefox-24.5.0-1.0.2.AXS3

エラータID: AXSA:2014-356:03

Release date: 
Wednesday, May 28, 2014 - 18:41
Subject: 
firefox-24.5.0-1.0.2.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Security issues fixed with this release:

• CVE-2014-1518
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2014-1523
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.

• CVE-2014-1524
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.

• CVE-2014-1529
The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.

• CVE-2014-1530
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.

• CVE-2014-1531
Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.

• CVE-2014-1532
Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.

Solution: 

Update packages.

Additional Info: 

This is a new version rebuilt to remove a dependency issue.

Download: 

SRPMS
  1. firefox-24.5.0-1.0.2.AXS3.src.rpm
    MD5: 6b89ed3dd03eddd7d0d44e34cbd41e3f
    SHA-256: 21dbcefeaf231ae0b16157626dbfff2f9fc28c0d6b311f662f097e83f844e824
    Size: 138.09 MB

Asianux Server 3 for x86
  1. firefox-24.5.0-1.0.2.AXS3.i386.rpm
    MD5: aada32f9c554dbb5322f1e9f835aabd0
    SHA-256: 342c014e9550f507c617a27d6c684cac9c78c3bd6ce72e58adfd24f35177dffd
    Size: 49.10 MB

Asianux Server 3 for x86_64
  1. firefox-24.5.0-1.0.2.AXS3.x86_64.rpm
    MD5: a5e9d0263198fc80bb14ff93a2516c29
    SHA-256: f0f581039ea1a54a6bb37b4d76fefa0a684cb5dae89992e416208ea6c3e61d49
    Size: 50.21 MB