forked from pool/MozillaThunderbird
- update to Thunderbird 14.0 (bnc#771583)
* MFSA 2012-42/CVE-2012-1949/CVE-2012-1948 Miscellaneous memory safety hazards * MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952 Gecko memory corruption * MFSA 2012-45/CVE-2012-1955 (bmo#757376) Spoofing issue with location * MFSA 2012-47/CVE-2012-1957 (bmo#750096) Improper filtering of javascript in HTML feed-view * MFSA 2012-48/CVE-2012-1958 (bmo#750820) use-after-free in nsGlobalWindow::PageHidden * MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559) Same-compartment Security Wrappers can be bypassed * MFSA 2012-50/CVE-2012-1960 (bmo#761014) Out of bounds read in QCMS * MFSA 2012-51/CVE-2012-1961 (bmo#761655) X-Frame-Options header ignored when duplicated * MFSA 2012-52/CVE-2012-1962 (bmo#764296) JSDependentString::undepend string conversion results in memory corruption * MFSA 2012-53/CVE-2012-1963 (bmo#767778) Content Security Policy 1.0 implementation errors cause data leakage * MFSA 2012-56/CVE-2012-1967 (bmo#758344) Code execution through javascript: URLs OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=185
This commit is contained in:
parent
bff98d2e04
commit
19daaad5c6
@ -1,7 +1,31 @@
|
|||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sun Jul 15 08:06:50 UTC 2012 - wr@rosenauer.org
|
Sun Jul 15 08:06:50 UTC 2012 - wr@rosenauer.org
|
||||||
|
|
||||||
- update to Thunderbird 14.0 (bnc#)
|
- update to Thunderbird 14.0 (bnc#771583)
|
||||||
|
* MFSA 2012-42/CVE-2012-1949/CVE-2012-1948
|
||||||
|
Miscellaneous memory safety hazards
|
||||||
|
* MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952
|
||||||
|
Gecko memory corruption
|
||||||
|
* MFSA 2012-45/CVE-2012-1955 (bmo#757376)
|
||||||
|
Spoofing issue with location
|
||||||
|
* MFSA 2012-47/CVE-2012-1957 (bmo#750096)
|
||||||
|
Improper filtering of javascript in HTML feed-view
|
||||||
|
* MFSA 2012-48/CVE-2012-1958 (bmo#750820)
|
||||||
|
use-after-free in nsGlobalWindow::PageHidden
|
||||||
|
* MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559)
|
||||||
|
Same-compartment Security Wrappers can be bypassed
|
||||||
|
* MFSA 2012-50/CVE-2012-1960 (bmo#761014)
|
||||||
|
Out of bounds read in QCMS
|
||||||
|
* MFSA 2012-51/CVE-2012-1961 (bmo#761655)
|
||||||
|
X-Frame-Options header ignored when duplicated
|
||||||
|
* MFSA 2012-52/CVE-2012-1962 (bmo#764296)
|
||||||
|
JSDependentString::undepend string conversion results in memory
|
||||||
|
corruption
|
||||||
|
* MFSA 2012-53/CVE-2012-1963 (bmo#767778)
|
||||||
|
Content Security Policy 1.0 implementation errors cause data
|
||||||
|
leakage
|
||||||
|
* MFSA 2012-56/CVE-2012-1967 (bmo#758344)
|
||||||
|
Code execution through javascript: URLs
|
||||||
* relicensed to MPL-2.0
|
* relicensed to MPL-2.0
|
||||||
- update Enigmail to 1.4.3
|
- update Enigmail to 1.4.3
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user