CESA-2015:1581 Important CentOS 5 firefoxSecurity Update

CentOS Errata and Security Advisory 2015:1581 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1581.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
c7d0fc6c649bb5e2f41db2ea6f80b52789ddfafc643e59984bdeca42b7608b76  firefox-38.1.1-1.el5.centos.i386.rpm

x86_64:
c7d0fc6c649bb5e2f41db2ea6f80b52789ddfafc643e59984bdeca42b7608b76  firefox-38.1.1-1.el5.centos.i386.rpm
dc5d13d355ac83ee3dd3afb1dbcf0a6ded74be68500d09a869555dad0c609b55  firefox-38.1.1-1.el5.centos.x86_64.rpm

Source:
31f07cce830004db1f142096cc5467d943ba949ddff06b9c429dee78c1c6ece5  firefox-38.1.1-1.el5.centos.src.rpm



RHSA-2015:1581-1: Important: firefox security update

Red Hat Enterprise Linux: Updated firefox packages that fix one security issue are now available for
Red Hat Enterprise Linux 5, 6, and 7.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-4495

CESA-2015:1581 Important CentOS 6 firefoxSecurity Update

CentOS Errata and Security Advisory 2015:1581 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1581.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
8020a7a951eb3c3c274c709bc4870d187c096b5b2b7d676f7ed2928b1c71e9a9  firefox-38.1.1-1.el6.centos.i686.rpm

x86_64:
8020a7a951eb3c3c274c709bc4870d187c096b5b2b7d676f7ed2928b1c71e9a9  firefox-38.1.1-1.el6.centos.i686.rpm
31075747bdd941dc9f23b2c27cb52b1acfafc4b6480e33e1b0c58a4983b586f0  firefox-38.1.1-1.el6.centos.x86_64.rpm

Source:
8523f6499d96465fd55567593e254666303af0182bdf96a6c7462082dd8432fd  firefox-38.1.1-1.el6.centos.src.rpm



CVE-2015-1805

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an “I/O vector array overrun.”

CESA-2015:1581 Important CentOS 7 firefoxSecurity Update

CentOS Errata and Security Advisory 2015:1581 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1581.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
b77bcb4855eaacc2a86d90bc5cc2c064059d97ae92c4a199bbda755df9ab4fbd  firefox-38.1.1-1.el7.centos.i686.rpm
1ed08983be3eac961d8227a70b6fb13ad83aa0cb874873fc9676569d312fb1a8  firefox-38.1.1-1.el7.centos.x86_64.rpm

Source:
a51558258a9efa51d0c49d28f8ff10d62aa6c39b8e13e6d4294952fad9088378  firefox-38.1.1-1.el7.centos.src.rpm