firefox-31.2.0-3.0.1.AXS4

エラータID: AXSA:2014-595:06

Release date: 
Thursday, October 16, 2014 - 14:45
Subject: 
firefox-31.2.0-3.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

Description :
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.

Security issues fixed with this release:
CVE-2014-1574
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1576
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

CVE-2014-1577
The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.

CVE-2014-1578
The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.

CVE-2014-1581
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.

CVE-2014-1583
The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.

Please see below CVE's link for more information.

Solution: 

update package.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-31.2.0-3.0.1.AXS4.src.rpm
    MD5: d6f2b158609f7307aed82b618e1d0ebb
    SHA-256: c75c096c5fd9086ed8adefe1a358e41d82b32513f2f8e9124fa18984f77c1fbd
    Size: 169.70 MB

Asianux Server 4 for x86
  1. firefox-31.2.0-3.0.1.AXS4.i686.rpm
    MD5: 6123c39f689bf65ea5771b28fa785eee
    SHA-256: edcf4678191e6a4fa479c02e005fb288512dbb2cfb4f27a29c6a925313d52ebf
    Size: 60.73 MB

Asianux Server 4 for x86_64
  1. firefox-31.2.0-3.0.1.AXS4.x86_64.rpm
    MD5: 5e48f47c87390887b2c21ebe2f82d999
    SHA-256: 7b7b434a21aa4cb431130cd4175a17ce7a5d1ef4c04d4693261030854b3e7626
    Size: 60.16 MB
  2. firefox-31.2.0-3.0.1.AXS4.i686.rpm
    MD5: 6123c39f689bf65ea5771b28fa785eee
    SHA-256: edcf4678191e6a4fa479c02e005fb288512dbb2cfb4f27a29c6a925313d52ebf
    Size: 60.73 MB