firefox-45.2.0-1.0.1.AXS4
エラータID: AXSA:2016-495:06
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.
Security issues fixed with this release:
CVE-2016-2818
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-2819
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-2821
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-2822
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-2828
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-2831
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
Update packages.
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
N/A
SRPMS
- firefox-45.2.0-1.0.1.AXS4.src.rpm
MD5: 3108d8b3c183cc3c9cadaa6bc8618eeb
SHA-256: 25ae36f323f078fd3ff7b75fc1223cbc3a204e6ddc33485d18b815890899798e
Size: 338.09 MB
Asianux Server 4 for x86
- firefox-45.2.0-1.0.1.AXS4.i686.rpm
MD5: 3b5888861dc628109cc50563e0ebeb18
SHA-256: c0822e0dc4b2adb99cbc90e0191763418f45aa570f6adbb812fb35fdc3786ced
Size: 74.82 MB
Asianux Server 4 for x86_64
- firefox-45.2.0-1.0.1.AXS4.x86_64.rpm
MD5: 26f76d878859d7932d19537d664fb9a9
SHA-256: 74c24d7ab9b45b328f1db2bc31d11a069d567dfaebb4db29f0e92182d8e35d4a
Size: 74.29 MB - firefox-45.2.0-1.0.1.AXS4.i686.rpm
MD5: 3b5888861dc628109cc50563e0ebeb18
SHA-256: c0822e0dc4b2adb99cbc90e0191763418f45aa570f6adbb812fb35fdc3786ced
Size: 74.82 MB