MozillaFirefox/firefox-62.0.3.source.tar.xz.asc
Wolfgang Rosenauer 7f0ad4c413 Accepting request 639735 from home:AndreasStieger:branches:mozilla:Factory
- Mozilla Firefox 62.0.3:
  MFSA 2018-24
  * CVE-2018-12386 (bsc#1110506, bmo#1493900)
    Type confusion in JavaScript allowed remote code execution
  * CVE-2018-12387 (bsc#1110507, bmo#1493903)
    Array.prototype.push stack pointer vulnerability may enable
    exploits in the sandboxed content process

OBS-URL: https://build.opensuse.org/request/show/639735
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=688
2018-10-03 12:24:02 +00:00

18 lines
836 B
Plaintext

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)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=lzNt
-----END PGP SIGNATURE-----