Download Of The Day: Firefox 3.0.1 (Critical Security Update)

in Categories CentOS, Debian Linux, Download of the day, GNU/Open source, Linux desktop, Linux distribution, package management, RedHat/Fedora Linux, Security Alert, UNIX last updated July 18, 2008

Firefox 3.0.1 has been released and available for download. This update has been rated as having critical security impact by the Mozilla. Use the following instructions to upgrade Firefox.

Security Issues

An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious web site could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785)

A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933)

Download Firefox 3.0.1

=> Visit offical site to grab Firefox 3.0.1

How do I upgrade Firefox to version 3.0.1?

See how to install firefox-3.0.1.tar.bz2 in Linux

How do I update Firefox under Redhat / Fedora / CentOS Linux?

Simply type the following command, enter:
# yum update

How do I update Firefox under Debian / Ubuntu Linux?

Open terminal and simply type the following commands, enter:
$ sudo apt-get update
$ sudo apt-get upgrade

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

Share this on (or read 2 comments/add one below):

2 comment

  1. Following three security issues have been fixed in Firefox 3.0.1

    1) MFSA 2008-36 Crash with malformed GIF file on Mac OS X
    2) MFSA 2008-35 Command-line URLs launch multiple tabs when Firefox not running
    3) MFSA 2008-34 Remote code execution by overflowing CSS reference counter

    The Geek Stuff

    Have a question? Post it on our forum!