Enterprise Linux Security Advisory ELSA-2008-1036 https://rhn.redhat.com/errata/RHSA-2008-1036.html The following updated rpms for Enterprise Linux 5 have been uploaded to the Unbreakable Linux Network: i386: firefox-3.0.5-1.0.1.el5_2.i386.rpm nspr-4.7.3-2.el5.i386.rpm nspr-devel-4.7.3-2.el5.i386.rpm nss-3.12.2.0-2.el5.i386.rpm nss-devel-3.12.2.0-2.el5.i386.rpm nss-pkcs11-devel-3.12.2.0-2.el5.i386.rpm nss-tools-3.12.2.0-2.el5.i386.rpm xulrunner-1.9.0.5-1.0.1.el5_2.i386.rpm xulrunner-devel-1.9.0.5-1.0.1.el5_2.i386.rpm xulrunner-devel-unstable-1.9.0.5-1.0.1.el5_2.i386.rpm x86_64: firefox-3.0.5-1.0.1.el5_2.i386.rpm firefox-3.0.5-1.0.1.el5_2.x86_64.rpm nspr-4.7.3-2.el5.i386.rpm nspr-4.7.3-2.el5.x86_64.rpm nspr-devel-4.7.3-2.el5.i386.rpm nspr-devel-4.7.3-2.el5.x86_64.rpm nss-3.12.2.0-2.el5.i386.rpm nss-3.12.2.0-2.el5.x86_64.rpm nss-devel-3.12.2.0-2.el5.i386.rpm nss-devel-3.12.2.0-2.el5.x86_64.rpm nss-pkcs11-devel-3.12.2.0-2.el5.i386.rpm nss-pkcs11-devel-3.12.2.0-2.el5.x86_64.rpm nss-tools-3.12.2.0-2.el5.x86_64.rpm xulrunner-1.9.0.5-1.0.1.el5_2.i386.rpm xulrunner-1.9.0.5-1.0.1.el5_2.x86_64.rpm xulrunner-devel-1.9.0.5-1.0.1.el5_2.i386.rpm xulrunner-devel-1.9.0.5-1.0.1.el5_2.x86_64.rpm xulrunner-devel-unstable-1.9.0.5-1.0.1.el5_2.x86_64.rpm SRPMS: http://oss.oracle.com/el5/SRPMS-updates/firefox-3.0.5-1.0.1.el5_2.src.rpm http://oss.oracle.com/el5/SRPMS-updates/nspr-4.7.3-2.el5.src.rpm http://oss.oracle.com/el5/SRPMS-updates/nss-3.12.2.0-2.el5.src.rpm http://oss.oracle.com/el5/SRPMS-updates/xulrunner-1.9.0.5-1.0.1.el5_2.src.rpm Description of changes: firefox : [3.0.5-1.0.1] - Added firefox-oracle-default-prefs.js/firefox-oracle-default-bookmarks.html - Removed the corresponding files of Red Hat. - Added patch oracle-firefox-branding.patch - Update firstrun URL in spec file [3.0.5-1] - Update to Firefox 3.0.5 nspr: [4.7.3-2] - Update to NSPR 4.7.3 nss: [3.12.2.0-2] - Update to NSS_3_12_2_RC1 - Use system zlib xulrunner: [1.9.0.5-1.0.1] - Added xulrunner-oracle-default-prefs.js
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center