Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1095 - Security Advisory
Issued:
2009-06-11
Updated:
2009-06-11

RHSA-2009:1095 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: firefox security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated firefox packages that fix several security issues are now available
for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Description

Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code as the user running Firefox.
(CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1837, CVE-2009-1838,
CVE-2009-1841)

Multiple flaws were found in the processing of malformed, local file
content. If a user loaded malicious, local content via the file:// URL, it
was possible for that content to access other local data. (CVE-2009-1835,
CVE-2009-1839)

A script, privilege elevation flaw was found in the way Firefox loaded XML
User Interface Language (XUL) scripts. Firefox and certain add-ons could
load malicious content when certain policy checks did not happen.
(CVE-2009-1840)

A flaw was found in the way Firefox displayed certain Unicode characters in
International Domain Names (IDN). If an IDN contained invalid characters,
they may have been displayed as spaces, making it appear to the user that
they were visiting a trusted site. (CVE-2009-1834)

A flaw was found in the way Firefox handled error responses returned from
proxy servers. If an attacker is able to conduct a man-in-the-middle attack
against a Firefox instance that is using a proxy server, they may be able
to steal sensitive information from the site the user is visiting.
(CVE-2009-1836)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.0.11. You can find a link to the Mozilla
advisories in the References section of this errata.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.11, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 488570 - frequent firefox crashes against clearspace
  • BZ - 503568 - CVE-2009-1392 Firefox browser engine crashes
  • BZ - 503569 - CVE-2009-1832 Firefox double frame construction flaw
  • BZ - 503570 - CVE-2009-1833 Firefox JavaScript engine crashes
  • BZ - 503573 - CVE-2009-1834 Firefox URL spoofing with invalid unicode characters
  • BZ - 503576 - CVE-2009-1835 Firefox Arbitrary domain cookie access by local file: resources
  • BZ - 503578 - CVE-2009-1836 Firefox SSL tampering via non-200 responses to proxy CONNECT requests
  • BZ - 503579 - CVE-2009-1837 Firefox Race condition while accessing the private data of a NPObject JS wrapper class object
  • BZ - 503580 - CVE-2009-1838 Firefox arbitrary code execution flaw
  • BZ - 503581 - CVE-2009-1839 Firefox information disclosure flaw
  • BZ - 503582 - CVE-2009-1840 Firefox XUL scripts skip some security checks
  • BZ - 503583 - CVE-2009-1841 Firefox JavaScript arbitrary code execution

CVEs

  • CVE-2009-1833
  • CVE-2009-1841
  • CVE-2009-1840
  • CVE-2009-1838
  • CVE-2009-1839
  • CVE-2009-1832
  • CVE-2009-1392
  • CVE-2009-1834
  • CVE-2009-1835
  • CVE-2009-1836
  • CVE-2009-1837

References

  • http://www.redhat.com/security/updates/classification/#critical
  • http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.11
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
firefox-3.0.11-2.el5_3.src.rpm SHA-256: dcbed8cea01636152ebae186cc2ddbf2eee74e5bcaa73e56a56579d7c3cfe410
xulrunner-1.9.0.11-3.el5_3.src.rpm SHA-256: 13e13d8293254fb68402e21d183c3dbe6f0760159eb17b3294221534021b4b8d
x86_64
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
firefox-3.0.11-2.el5_3.x86_64.rpm SHA-256: 077aee463443302276f243a14d194d2fd179c2d9ce85b9138975f2ed04bd5153
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: 6c7773494b5e2b37be8ad75268bd50824f243ffb05fac8edb2d906b65edc8bb1
xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm SHA-256: 4ded89a36837d0f7ad2986449fe2b5670bc7096989c06ea9b65123a8737837b2
xulrunner-devel-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: ba43b413ee28ec025e23f81c1a90cf21533af208ae43e9c463371fa5cc2ec509
xulrunner-devel-unstable-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: d8901c2ddadb37787630129c53ef988a65918e0cbb75a4abfc70b154801a555d
ia64
firefox-3.0.11-2.el5_3.ia64.rpm SHA-256: 44231ca53ba62be494379a21f82f53246a578d47eb9901c7baa3cf2ebd37f9f9
xulrunner-1.9.0.11-3.el5_3.ia64.rpm SHA-256: 2d6d9df157c391144560e1fddb2de9d848679b1f07b971b4ea74dc669a78d04c
xulrunner-devel-1.9.0.11-3.el5_3.ia64.rpm SHA-256: daad95e571d28cc38c52e3f5b2f9ad14af30842651d372e1bddb69b1c30be809
xulrunner-devel-unstable-1.9.0.11-3.el5_3.ia64.rpm SHA-256: dbfbc90bc05fd253a1589c70c57ae61876d4724dbf2e43d7a9ec11516a0b4c07
i386
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm SHA-256: 4ded89a36837d0f7ad2986449fe2b5670bc7096989c06ea9b65123a8737837b2
xulrunner-devel-unstable-1.9.0.11-3.el5_3.i386.rpm SHA-256: e2e7bef083a43783be051889cb39e50b7bb658713350d98ef5a2d4f5843cc022

Red Hat Enterprise Linux Server 4

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
x86_64
firefox-3.0.11-4.el4.x86_64.rpm SHA-256: 48c1a7ffa95954a896f88abd95e77e171c942904d26c0a8484fbff2f6bbfc2fc
firefox-3.0.11-4.el4.x86_64.rpm SHA-256: 48c1a7ffa95954a896f88abd95e77e171c942904d26c0a8484fbff2f6bbfc2fc
ia64
firefox-3.0.11-4.el4.ia64.rpm SHA-256: 330e68becc3cab710f518ddec3677400ef86e4a7938aeac12551416d15a87e4d
firefox-3.0.11-4.el4.ia64.rpm SHA-256: 330e68becc3cab710f518ddec3677400ef86e4a7938aeac12551416d15a87e4d
i386
firefox-3.0.11-4.el4.i386.rpm SHA-256: a42165a9bbf286359669292b865f95e777fbccf3bcbec784bc2c7876624cb108
firefox-3.0.11-4.el4.i386.rpm SHA-256: a42165a9bbf286359669292b865f95e777fbccf3bcbec784bc2c7876624cb108

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
x86_64
firefox-3.0.11-4.el4.x86_64.rpm SHA-256: 48c1a7ffa95954a896f88abd95e77e171c942904d26c0a8484fbff2f6bbfc2fc
firefox-3.0.11-4.el4.x86_64.rpm SHA-256: 48c1a7ffa95954a896f88abd95e77e171c942904d26c0a8484fbff2f6bbfc2fc
ia64
firefox-3.0.11-4.el4.ia64.rpm SHA-256: 330e68becc3cab710f518ddec3677400ef86e4a7938aeac12551416d15a87e4d
firefox-3.0.11-4.el4.ia64.rpm SHA-256: 330e68becc3cab710f518ddec3677400ef86e4a7938aeac12551416d15a87e4d
i386
firefox-3.0.11-4.el4.i386.rpm SHA-256: a42165a9bbf286359669292b865f95e777fbccf3bcbec784bc2c7876624cb108
firefox-3.0.11-4.el4.i386.rpm SHA-256: a42165a9bbf286359669292b865f95e777fbccf3bcbec784bc2c7876624cb108

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
firefox-3.0.11-2.el5_3.src.rpm SHA-256: dcbed8cea01636152ebae186cc2ddbf2eee74e5bcaa73e56a56579d7c3cfe410
xulrunner-1.9.0.11-3.el5_3.src.rpm SHA-256: 13e13d8293254fb68402e21d183c3dbe6f0760159eb17b3294221534021b4b8d
x86_64
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
firefox-3.0.11-2.el5_3.x86_64.rpm SHA-256: 077aee463443302276f243a14d194d2fd179c2d9ce85b9138975f2ed04bd5153
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: 6c7773494b5e2b37be8ad75268bd50824f243ffb05fac8edb2d906b65edc8bb1
xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm SHA-256: 4ded89a36837d0f7ad2986449fe2b5670bc7096989c06ea9b65123a8737837b2
xulrunner-devel-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: ba43b413ee28ec025e23f81c1a90cf21533af208ae43e9c463371fa5cc2ec509
xulrunner-devel-unstable-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: d8901c2ddadb37787630129c53ef988a65918e0cbb75a4abfc70b154801a555d
i386
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm SHA-256: 4ded89a36837d0f7ad2986449fe2b5670bc7096989c06ea9b65123a8737837b2
xulrunner-devel-unstable-1.9.0.11-3.el5_3.i386.rpm SHA-256: e2e7bef083a43783be051889cb39e50b7bb658713350d98ef5a2d4f5843cc022

Red Hat Enterprise Linux Workstation 4

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
x86_64
firefox-3.0.11-4.el4.x86_64.rpm SHA-256: 48c1a7ffa95954a896f88abd95e77e171c942904d26c0a8484fbff2f6bbfc2fc
ia64
firefox-3.0.11-4.el4.ia64.rpm SHA-256: 330e68becc3cab710f518ddec3677400ef86e4a7938aeac12551416d15a87e4d
i386
firefox-3.0.11-4.el4.i386.rpm SHA-256: a42165a9bbf286359669292b865f95e777fbccf3bcbec784bc2c7876624cb108

Red Hat Enterprise Linux Desktop 5

SRPM
firefox-3.0.11-2.el5_3.src.rpm SHA-256: dcbed8cea01636152ebae186cc2ddbf2eee74e5bcaa73e56a56579d7c3cfe410
xulrunner-1.9.0.11-3.el5_3.src.rpm SHA-256: 13e13d8293254fb68402e21d183c3dbe6f0760159eb17b3294221534021b4b8d
x86_64
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
firefox-3.0.11-2.el5_3.x86_64.rpm SHA-256: 077aee463443302276f243a14d194d2fd179c2d9ce85b9138975f2ed04bd5153
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: 6c7773494b5e2b37be8ad75268bd50824f243ffb05fac8edb2d906b65edc8bb1
i386
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce

Red Hat Enterprise Linux Desktop 4

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
x86_64
firefox-3.0.11-4.el4.x86_64.rpm SHA-256: 48c1a7ffa95954a896f88abd95e77e171c942904d26c0a8484fbff2f6bbfc2fc
i386
firefox-3.0.11-4.el4.i386.rpm SHA-256: a42165a9bbf286359669292b865f95e777fbccf3bcbec784bc2c7876624cb108

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
firefox-3.0.11-2.el5_3.src.rpm SHA-256: dcbed8cea01636152ebae186cc2ddbf2eee74e5bcaa73e56a56579d7c3cfe410
xulrunner-1.9.0.11-3.el5_3.src.rpm SHA-256: 13e13d8293254fb68402e21d183c3dbe6f0760159eb17b3294221534021b4b8d
s390x
firefox-3.0.11-2.el5_3.s390.rpm SHA-256: a13651c02fc4308320a856d4bf8a8b598c93ccb7b6efdbca0a264992b5e9b288
firefox-3.0.11-2.el5_3.s390x.rpm SHA-256: ecf33228f8080b9fdfc0a60cf845fc1d4b9c4d8f7ef81959961cc65f3400a325
xulrunner-1.9.0.11-3.el5_3.s390.rpm SHA-256: 2e183d6662905519d5c813ab29dfb78eeabc09a3c31f28bba3fa834785f4534a
xulrunner-1.9.0.11-3.el5_3.s390x.rpm SHA-256: 5a0e75911ee78d4db82a2e934fcd07451741b1ac8f2161c6fe8afb36a1293036
xulrunner-devel-1.9.0.11-3.el5_3.s390.rpm SHA-256: 568994f7d59b6242a5abb8ef2973af1b9ce968af6a0d99de8f9fc418a3f0a686
xulrunner-devel-1.9.0.11-3.el5_3.s390x.rpm SHA-256: 4e38e49c5f4880ba001098d8c713238591d6c8fad196f55536d99b62706e01bc
xulrunner-devel-unstable-1.9.0.11-3.el5_3.s390x.rpm SHA-256: 2228f76dcc96c7f50cc5bf7bde0032f34dfb24e40e45221281e8c94397827af2

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
s390x
firefox-3.0.11-4.el4.s390x.rpm SHA-256: 87fe9c1d4aa1280e1f28ec62d7f37364b4912979e527db015399bac681c6894c
s390
firefox-3.0.11-4.el4.s390.rpm SHA-256: 27e3ba43b16643910b238732128c4cd872c85345a3c42c92a5dc1ca815f8907e

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
s390x
firefox-3.0.11-4.el4.s390x.rpm SHA-256: 87fe9c1d4aa1280e1f28ec62d7f37364b4912979e527db015399bac681c6894c
s390
firefox-3.0.11-4.el4.s390.rpm SHA-256: 27e3ba43b16643910b238732128c4cd872c85345a3c42c92a5dc1ca815f8907e

Red Hat Enterprise Linux for Power, big endian 5

SRPM
firefox-3.0.11-2.el5_3.src.rpm SHA-256: dcbed8cea01636152ebae186cc2ddbf2eee74e5bcaa73e56a56579d7c3cfe410
xulrunner-1.9.0.11-3.el5_3.src.rpm SHA-256: 13e13d8293254fb68402e21d183c3dbe6f0760159eb17b3294221534021b4b8d
ppc
firefox-3.0.11-2.el5_3.ppc.rpm SHA-256: d53e6ddd97c9f188ffb97c5d0346979cc81b714de93fd38e870a19eb983f73e9
xulrunner-1.9.0.11-3.el5_3.ppc.rpm SHA-256: f1f72f6f64922d0bc4e3edfd7ebdb3cfb0e8898ab01f8692a2b625839cc609d0
xulrunner-1.9.0.11-3.el5_3.ppc64.rpm SHA-256: de94953334ef848deab7e70a964947027b591c3da47c01846a7fe9fc916f634d
xulrunner-devel-1.9.0.11-3.el5_3.ppc.rpm SHA-256: 0816ce50defbfe5f67638980790d0064336a8353a9e8fe6f8d2a333e6ab3e318
xulrunner-devel-1.9.0.11-3.el5_3.ppc64.rpm SHA-256: 1064ee407935fb60d598feb34f4dd7c0d4a63a7e7cb7a7198ba0a227a638e938
xulrunner-devel-unstable-1.9.0.11-3.el5_3.ppc.rpm SHA-256: 4b6d8a8a9c4d14ea5377b28f1987fa15a42abc3be513cf4fe18d088a21bf312c

Red Hat Enterprise Linux for Power, big endian 4

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
ppc
firefox-3.0.11-4.el4.ppc.rpm SHA-256: 5b80a614d811bb41b8e6e74da1534daa047e17d46f8c29cebabcee26f6b95837

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
firefox-3.0.11-4.el4.src.rpm SHA-256: e70e521e2ad83b09b64bfb005699dc9d292ae2b452b79e333bc969022617e6f7
ppc
firefox-3.0.11-4.el4.ppc.rpm SHA-256: 5b80a614d811bb41b8e6e74da1534daa047e17d46f8c29cebabcee26f6b95837

Red Hat Enterprise Linux Server from RHUI 5

SRPM
firefox-3.0.11-2.el5_3.src.rpm SHA-256: dcbed8cea01636152ebae186cc2ddbf2eee74e5bcaa73e56a56579d7c3cfe410
xulrunner-1.9.0.11-3.el5_3.src.rpm SHA-256: 13e13d8293254fb68402e21d183c3dbe6f0760159eb17b3294221534021b4b8d
x86_64
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
firefox-3.0.11-2.el5_3.x86_64.rpm SHA-256: 077aee463443302276f243a14d194d2fd179c2d9ce85b9138975f2ed04bd5153
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: 6c7773494b5e2b37be8ad75268bd50824f243ffb05fac8edb2d906b65edc8bb1
xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm SHA-256: 4ded89a36837d0f7ad2986449fe2b5670bc7096989c06ea9b65123a8737837b2
xulrunner-devel-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: ba43b413ee28ec025e23f81c1a90cf21533af208ae43e9c463371fa5cc2ec509
xulrunner-devel-unstable-1.9.0.11-3.el5_3.x86_64.rpm SHA-256: d8901c2ddadb37787630129c53ef988a65918e0cbb75a4abfc70b154801a555d
i386
firefox-3.0.11-2.el5_3.i386.rpm SHA-256: dcb33efa5795d2b6305bd7dd8d8135e0f2792bc143532fc71653960513b38edf
xulrunner-1.9.0.11-3.el5_3.i386.rpm SHA-256: b27cde770a284d77c2058f1181824b09f61b20ba79ca5de3177a1e009ecb22ce
xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm SHA-256: 4ded89a36837d0f7ad2986449fe2b5670bc7096989c06ea9b65123a8737837b2
xulrunner-devel-unstable-1.9.0.11-3.el5_3.i386.rpm SHA-256: e2e7bef083a43783be051889cb39e50b7bb658713350d98ef5a2d4f5843cc022

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility