[OpenIndiana-discuss] openindiana-discuss Digest, Vol 63, Issue 17
Ramesh Chari
rvchari at ymail.com
Fri Oct 23 14:10:59 UTC 2015
my firefox version still returns 24.8.1 and i currently use FF37 that i installed from opensxce pkg... never upgraded FF37 till date.
btw, how do i upgrade 24.8.1 ?
On Friday, 23 October 2015 5:30 PM, "openindiana-discuss-request at openindiana.org" <openindiana-discuss-request at openindiana.org> wrote:
Send openindiana-discuss mailing list submissions to
openindiana-discuss at openindiana.org
To subscribe or unsubscribe via the World Wide Web, visit
http://openindiana.org/mailman/listinfo/openindiana-discuss
or, via email, send a message with subject or body 'help' to
openindiana-discuss-request at openindiana.org
You can reach the person managing the list at
openindiana-discuss-owner at openindiana.org
When replying, please edit your Subject line so it is more specific
than "Re: Contents of openindiana-discuss digest..."
Today's Topics:
1. Security awareness: Update to Firefox 38.2.1 ESR or greater
(ken mays)
----------------------------------------------------------------------
Message: 1
Date: Thu, 22 Oct 2015 12:40:34 +0000 (UTC)
From: ken mays <maybird1776 at yahoo.com>
To: Discussion List for OpenIndiana
<openindiana-discuss at openindiana.org>, OpenIndiana Developer Mailing
List <oi-dev at openindiana.org>
Subject: [OpenIndiana-discuss] Security awareness: Update to Firefox
38.2.1 ESR or greater
Message-ID:
<1656792825.1464770.1445517634811.JavaMail.yahoo at mail.yahoo.com>
Content-Type: text/plain; charset=UTF-8
URL:?http://ftp.mozilla.org/pub/firefox/releases/38.2.1esr/contrib/
Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.
A flaw was found in the processing of malformed web content. A web page
containing malicious content could cause Firefox to crash or, potentially,
execute arbitrary code with the privileges of the user running Firefox.
(CVE-2015-4497)
A flaw was found in the way Firefox handled installation of add-ons.
An attacker could use this flaw to bypass the add-on installation prompt,
and trick the user into installing an add-on from a malicious source.
(CVE-2015-4498)
All Firefox users should upgrade to?Firefox version 38.2.1 ESR or greater, whichcorrects these issues. After installing?the update, Firefox must be restartedfor the changes to take effect.
------------------------------
Subject: Digest Footer
_______________________________________________
openindiana-discuss mailing list
openindiana-discuss at openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss
------------------------------
End of openindiana-discuss Digest, Vol 63, Issue 17
***************************************************
More information about the openindiana-discuss
mailing list