Accepting request 577192 from mozilla:Factory

readded lost bsc bugnumbers for Leap 15
increased constraints to give i586 the chance to build again

OBS-URL: https://build.opensuse.org/request/show/577192
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/MozillaThunderbird?expand=0&rev=189
This commit is contained in:
Dominique Leuenberger 2018-02-18 10:39:01 +00:00 committed by Git OBS Bridge
commit bcf6d3e7d7
2 changed files with 6 additions and 6 deletions

View File

@ -43,13 +43,13 @@ Sat Dec 23 18:36:42 UTC 2017 - wr@rosenauer.org
* CVE-2017-7845 (bmo#1402372) * CVE-2017-7845 (bmo#1402372)
Buffer overflow when drawing and validating elements with ANGLE Buffer overflow when drawing and validating elements with ANGLE
library using Direct 3D 9 library using Direct 3D 9
* CVE-2017-7846 (bmo#1411716) * CVE-2017-7846 (bmo#1411716, bsc#1074043)
JavaScript Execution via RSS in mailbox:// origin JavaScript Execution via RSS in mailbox:// origin
* CVE-2017-7847 (bmo#1411708) * CVE-2017-7847 (bmo#1411708, bsc#1074044)
Local path string can be leaked from RSS feed Local path string can be leaked from RSS feed
* CVE-2017-7848 (bmo#1411699) * CVE-2017-7848 (bmo#1411699, bsc#1074045)
RSS Feed vulnerable to new line Injection RSS Feed vulnerable to new line Injection
* CVE-2017-7829 (bmo#1423432) * CVE-2017-7829 (bmo#1423432, bsc#1074046)
Mailsploit part 1: From address with encoded null character is Mailsploit part 1: From address with encoded null character is
cut off in message header display cut off in message header display

View File

@ -2,10 +2,10 @@
<constraints> <constraints>
<hardware> <hardware>
<disk> <disk>
<size unit="G">13</size> <size unit="G">16</size>
</disk> </disk>
<memory> <memory>
<size unit="M">6000</size> <size unit="M">9000</size>
</memory> </memory>
</hardware> </hardware>
</constraints> </constraints>