Skip to navigation

Security Advisory Critical: firefox security update

Advisory: RHSA-2013:1812-2
Type: Security Advisory
Severity: Critical
Issued on: 2013-12-11
Last updated on: 2013-12-11
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.5)
Red Hat Enterprise Linux Server EUS (v. 6.5.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-0772
CVE-2013-5609
CVE-2013-5612
CVE-2013-5613
CVE-2013-5614
CVE-2013-5616
CVE-2013-5618
CVE-2013-6671

Details

Updated firefox packages that fix several security issues are now available
for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to terminate
unexpectedly or, potentially, execute arbitrary code with the privileges of
the user running Firefox. (CVE-2013-5609, CVE-2013-5616, CVE-2013-5618,
CVE-2013-6671, CVE-2013-5613)

A flaw was found in the way Firefox rendered web content with missing
character encoding information. An attacker could use this flaw to possibly
bypass same-origin inheritance and perform cross-site scripting (XSS)
attacks. (CVE-2013-5612)

It was found that certain malicious web content could bypass restrictions
applied by sandboxed iframes. An attacker could combine this flaw with
other vulnerabilities to execute arbitrary code with the privileges of the
user running Firefox. (CVE-2013-5614)

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Ben Turner, Bobby Holley, Jesse Ruderman, Christian
Holler, Masato Kinugawa, Daniel Veditz, Jesse Schwartzentruber, Nils, Tyson
Smith, and Atte Kettunen as the original reporters of these issues.

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 24.2.0 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 24.2.0 ESR, which corrects these issues. After installing
the update, Firefox must be restarted for the changes to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
firefox-24.2.0-1.el5_10.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 64972a24ef573d5e338b752204677151
SHA-256: 5ff9948f51db70a992e035b50a3500263e80a5b88c0068531b5a7abfce7374d1
 
IA-32:
firefox-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: c80c2b769e3e04580ffefd432493eb3e
SHA-256: 0c9a87fac9e9fba1d1dac4cc3b1f182092bce13a27795641be6d7479cd926324
firefox-debuginfo-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: 7fdebf3f41b5ecb5f1254a15e52d25bf
SHA-256: 6b417940e082822af595c52672ec0bdd86680cee0a1bbfec0e13f977707e6e6a
 
IA-64:
firefox-24.2.0-1.el5_10.ia64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 0847b666c97037c03f3f5f17466fe703
SHA-256: 4809d4e4e63645e2078a04093506c3fd9fac3844b6b36f9d0ec1072ffc606a61
firefox-debuginfo-24.2.0-1.el5_10.ia64.rpm
File outdated by:  RHSA-2014:0310
    MD5: efff9c8193d809fa02b19707edefabe1
SHA-256: 1817e9bd31458bf51f4ecc1188ffc35a0413b42f257f5c4e680db9a1cace1c18
 
PPC:
firefox-24.2.0-1.el5_10.ppc.rpm
File outdated by:  RHSA-2014:0310
    MD5: 1b24172eba81e6dadc1a7db7544dfa25
SHA-256: 8f421c81a73654cabd3ef64412a3c8f0e928a4c3f921b34f7a4e46d5fdcfde0d
firefox-debuginfo-24.2.0-1.el5_10.ppc.rpm
File outdated by:  RHSA-2014:0310
    MD5: 0653b7840670c552ce773c5e378d871a
SHA-256: 8099a0f2cd4d5a26ac73f696f9d3425d270bcd0b6e9d1f1dda6db05062966824
 
s390x:
firefox-24.2.0-1.el5_10.s390.rpm
File outdated by:  RHSA-2014:0310
    MD5: e19377dc6d16b6c3ee951f982586611f
SHA-256: d2c72e9b6e35f084e58e91be933d2231bbec653fa41c2ce42c26f3a112e3a599
firefox-24.2.0-1.el5_10.s390x.rpm
File outdated by:  RHSA-2014:0310
    MD5: 13c36a19041745d48a1b1458dba4c1ae
SHA-256: 7a26a5bfcc20310a3a35bdd87f15d4609b47275e898cf8fff5fd84243ed2c1b6
firefox-debuginfo-24.2.0-1.el5_10.s390.rpm
File outdated by:  RHSA-2014:0310
    MD5: a3c1e8030ab877815475912ca874e29f
SHA-256: 375e9c4771424ef67c8f7da2058908ecc001f22982be1500e3cc72357b062185
firefox-debuginfo-24.2.0-1.el5_10.s390x.rpm
File outdated by:  RHSA-2014:0310
    MD5: be909a9b4d80ec99f5b32029987bc96d
SHA-256: 7ed39887236e68474afb637f141b923bd956aed511023a962621215fa8b057ff
 
x86_64:
firefox-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: c80c2b769e3e04580ffefd432493eb3e
SHA-256: 0c9a87fac9e9fba1d1dac4cc3b1f182092bce13a27795641be6d7479cd926324
firefox-24.2.0-1.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: b5b977a04de3c19060a8e7e4e8cbde49
SHA-256: 24b7109d53555d526d7fc9f181092496c619d9e46385782f0ca48f6c82cc4029
firefox-debuginfo-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: 7fdebf3f41b5ecb5f1254a15e52d25bf
SHA-256: 6b417940e082822af595c52672ec0bdd86680cee0a1bbfec0e13f977707e6e6a
firefox-debuginfo-24.2.0-1.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 222f9d7e2d1803c0c434384172eda477
SHA-256: 9d3a179bc8fdd139f30af655eb772c7d9b6e17647fa3094307e1f5fcfb3eb40e
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
firefox-24.2.0-1.el5_10.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 64972a24ef573d5e338b752204677151
SHA-256: 5ff9948f51db70a992e035b50a3500263e80a5b88c0068531b5a7abfce7374d1
 
IA-32:
firefox-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: c80c2b769e3e04580ffefd432493eb3e
SHA-256: 0c9a87fac9e9fba1d1dac4cc3b1f182092bce13a27795641be6d7479cd926324
firefox-debuginfo-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: 7fdebf3f41b5ecb5f1254a15e52d25bf
SHA-256: 6b417940e082822af595c52672ec0bdd86680cee0a1bbfec0e13f977707e6e6a
 
x86_64:
firefox-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: c80c2b769e3e04580ffefd432493eb3e
SHA-256: 0c9a87fac9e9fba1d1dac4cc3b1f182092bce13a27795641be6d7479cd926324
firefox-24.2.0-1.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: b5b977a04de3c19060a8e7e4e8cbde49
SHA-256: 24b7109d53555d526d7fc9f181092496c619d9e46385782f0ca48f6c82cc4029
firefox-debuginfo-24.2.0-1.el5_10.i386.rpm
File outdated by:  RHSA-2014:0310
    MD5: 7fdebf3f41b5ecb5f1254a15e52d25bf
SHA-256: 6b417940e082822af595c52672ec0bdd86680cee0a1bbfec0e13f977707e6e6a
firefox-debuginfo-24.2.0-1.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 222f9d7e2d1803c0c434384172eda477
SHA-256: 9d3a179bc8fdd139f30af655eb772c7d9b6e17647fa3094307e1f5fcfb3eb40e
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
firefox-24.2.0-1.el6_5.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26a896e462d110a681894b405c184953
SHA-256: a387ae85a90c91f48e0a4fef750007f2638ffce454baae542d240537f1b0838d
 
IA-32:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
 
x86_64:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: ca295cac7795130881e2928dd191181d
SHA-256: e0cba8793371dd0859c8965424de4c5b5efecfd43187b096c0c687b279d73683
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
firefox-debuginfo-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 5cbb06452f3235611ab3d90d6395833c
SHA-256: 85e25d43a46b1c6bd475c8df612ce22cb260fd5b262fcbf76d6767f34935d033
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
firefox-24.2.0-1.el6_5.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26a896e462d110a681894b405c184953
SHA-256: a387ae85a90c91f48e0a4fef750007f2638ffce454baae542d240537f1b0838d
 
x86_64:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: ca295cac7795130881e2928dd191181d
SHA-256: e0cba8793371dd0859c8965424de4c5b5efecfd43187b096c0c687b279d73683
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
firefox-debuginfo-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 5cbb06452f3235611ab3d90d6395833c
SHA-256: 85e25d43a46b1c6bd475c8df612ce22cb260fd5b262fcbf76d6767f34935d033
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
firefox-24.2.0-1.el6_5.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26a896e462d110a681894b405c184953
SHA-256: a387ae85a90c91f48e0a4fef750007f2638ffce454baae542d240537f1b0838d
 
IA-32:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
 
PPC:
firefox-24.2.0-1.el6_5.ppc.rpm
File outdated by:  RHSA-2014:0310
    MD5: 3703c0c4ac0190c49ccd094fa7b2748f
SHA-256: ae53f32ef346e513b8f43470f4989bd257099224de3b8c91e73948d62a332056
firefox-24.2.0-1.el6_5.ppc64.rpm
File outdated by:  RHSA-2014:0310
    MD5: a72c753ae8c585cdf732ae28e7f50201
SHA-256: 72b14dc1e6c00a0f41ddc3068d9ba4b92194c6b385ee04d0cbe47a4980447400
firefox-debuginfo-24.2.0-1.el6_5.ppc.rpm
File outdated by:  RHSA-2014:0310
    MD5: e4aa098f24caf2226611c787169bd4d6
SHA-256: 90e656f306e35968d2189051f134cca8e3a617488fab0e7079812a73b1e38746
firefox-debuginfo-24.2.0-1.el6_5.ppc64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 22a1958f25f12134849b7f057108bf0d
SHA-256: 6bd3d0782292bc5d87a40db27308807b1468244c5ae91656d5a849a8ae858773
 
s390x:
firefox-24.2.0-1.el6_5.s390.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26d18b6df61b82d0e90dcf7dd3ca1ec8
SHA-256: 6349d26d6770b2f5c5e4508f5eabe1f312107804693cd15ff5676608bd4d2545
firefox-24.2.0-1.el6_5.s390x.rpm
File outdated by:  RHSA-2014:0310
    MD5: ffa9cc0fc74d797b1b2289be3b91e6ce
SHA-256: 1eae2d326a92211d84e6a407c9114f0010799332c08e703130e2f0dee736fa39
firefox-debuginfo-24.2.0-1.el6_5.s390.rpm
File outdated by:  RHSA-2014:0310
    MD5: 1f3c014b58e3295771d4b9a71576584c
SHA-256: 60d38ac1769291f7ed44070ab5e273ee7d0a3965a9acea175b5ce153d9b0f4d4
firefox-debuginfo-24.2.0-1.el6_5.s390x.rpm
File outdated by:  RHSA-2014:0310
    MD5: 511cc8f800229dafbef367874b79fd8d
SHA-256: df84be5470bfb158d0a9a36de423a566a9922f2ab857baae43b9048b7c81f80c
 
x86_64:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: ca295cac7795130881e2928dd191181d
SHA-256: e0cba8793371dd0859c8965424de4c5b5efecfd43187b096c0c687b279d73683
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
firefox-debuginfo-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 5cbb06452f3235611ab3d90d6395833c
SHA-256: 85e25d43a46b1c6bd475c8df612ce22cb260fd5b262fcbf76d6767f34935d033
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
firefox-24.2.0-1.el6_5.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26a896e462d110a681894b405c184953
SHA-256: a387ae85a90c91f48e0a4fef750007f2638ffce454baae542d240537f1b0838d
 
x86_64:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: ca295cac7795130881e2928dd191181d
SHA-256: e0cba8793371dd0859c8965424de4c5b5efecfd43187b096c0c687b279d73683
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
firefox-debuginfo-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 5cbb06452f3235611ab3d90d6395833c
SHA-256: 85e25d43a46b1c6bd475c8df612ce22cb260fd5b262fcbf76d6767f34935d033
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
firefox-24.2.0-1.el6_5.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26a896e462d110a681894b405c184953
SHA-256: a387ae85a90c91f48e0a4fef750007f2638ffce454baae542d240537f1b0838d
 
IA-32:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
 
PPC:
firefox-24.2.0-1.el6_5.ppc.rpm
File outdated by:  RHSA-2014:0310
    MD5: 3703c0c4ac0190c49ccd094fa7b2748f
SHA-256: ae53f32ef346e513b8f43470f4989bd257099224de3b8c91e73948d62a332056
firefox-24.2.0-1.el6_5.ppc64.rpm
File outdated by:  RHSA-2014:0310
    MD5: a72c753ae8c585cdf732ae28e7f50201
SHA-256: 72b14dc1e6c00a0f41ddc3068d9ba4b92194c6b385ee04d0cbe47a4980447400
firefox-debuginfo-24.2.0-1.el6_5.ppc.rpm
File outdated by:  RHSA-2014:0310
    MD5: e4aa098f24caf2226611c787169bd4d6
SHA-256: 90e656f306e35968d2189051f134cca8e3a617488fab0e7079812a73b1e38746
firefox-debuginfo-24.2.0-1.el6_5.ppc64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 22a1958f25f12134849b7f057108bf0d
SHA-256: 6bd3d0782292bc5d87a40db27308807b1468244c5ae91656d5a849a8ae858773
 
s390x:
firefox-24.2.0-1.el6_5.s390.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26d18b6df61b82d0e90dcf7dd3ca1ec8
SHA-256: 6349d26d6770b2f5c5e4508f5eabe1f312107804693cd15ff5676608bd4d2545
firefox-24.2.0-1.el6_5.s390x.rpm
File outdated by:  RHSA-2014:0310
    MD5: ffa9cc0fc74d797b1b2289be3b91e6ce
SHA-256: 1eae2d326a92211d84e6a407c9114f0010799332c08e703130e2f0dee736fa39
firefox-debuginfo-24.2.0-1.el6_5.s390.rpm
File outdated by:  RHSA-2014:0310
    MD5: 1f3c014b58e3295771d4b9a71576584c
SHA-256: 60d38ac1769291f7ed44070ab5e273ee7d0a3965a9acea175b5ce153d9b0f4d4
firefox-debuginfo-24.2.0-1.el6_5.s390x.rpm
File outdated by:  RHSA-2014:0310
    MD5: 511cc8f800229dafbef367874b79fd8d
SHA-256: df84be5470bfb158d0a9a36de423a566a9922f2ab857baae43b9048b7c81f80c
 
x86_64:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: ca295cac7795130881e2928dd191181d
SHA-256: e0cba8793371dd0859c8965424de4c5b5efecfd43187b096c0c687b279d73683
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
firefox-debuginfo-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 5cbb06452f3235611ab3d90d6395833c
SHA-256: 85e25d43a46b1c6bd475c8df612ce22cb260fd5b262fcbf76d6767f34935d033
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
firefox-24.2.0-1.el6_5.src.rpm
File outdated by:  RHSA-2014:0310
    MD5: 26a896e462d110a681894b405c184953
SHA-256: a387ae85a90c91f48e0a4fef750007f2638ffce454baae542d240537f1b0838d
 
IA-32:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
 
x86_64:
firefox-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: bb99a3b366d16736c1a197b22a7121f0
SHA-256: e7e885a9b68a90faeec8b80e43125df05c3f3de8ee2aefe477e566336ff37cf6
firefox-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: ca295cac7795130881e2928dd191181d
SHA-256: e0cba8793371dd0859c8965424de4c5b5efecfd43187b096c0c687b279d73683
firefox-debuginfo-24.2.0-1.el6_5.i686.rpm
File outdated by:  RHSA-2014:0310
    MD5: af6768fe39710e1a917a82c39f87dbcb
SHA-256: e8b1a8bbe7902acb0b1307b4dafd6b66cd2bab98b4aa66431aecc4ec981dca5b
firefox-debuginfo-24.2.0-1.el6_5.x86_64.rpm
File outdated by:  RHSA-2014:0310
    MD5: 5cbb06452f3235611ab3d90d6395833c
SHA-256: 85e25d43a46b1c6bd475c8df612ce22cb260fd5b262fcbf76d6767f34935d033
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1039417 - CVE-2013-5609 Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104)
1039420 - CVE-2013-5612 Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106)
1039421 - CVE-2013-5614 Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107)
1039422 - CVE-2013-5616 Mozilla: Use-after-free in event listeners (MFSA 2013-108)
1039423 - CVE-2013-5618 Mozilla: Use-after-free during Table Editing (MFSA 2013-109)
1039426 - CVE-2013-6671 Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111)
1039429 - CVE-2013-5613 Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/