forked from pool/MozillaThunderbird
* MFSA 2012-74/CVE-2012-3982/CVE-2012-3983
Miscellaneous memory safety hazards * MFSA 2012-75/CVE-2012-3984 (bmo#575294) select element persistance allows for attacks * MFSA 2012-76/CVE-2012-3985 (bmo#655649) Continued access to initial origin after setting document.domain * MFSA 2012-77/CVE-2012-3986 (bmo#775868) Some DOMWindowUtils methods bypass security checks * MFSA 2012-79/CVE-2012-3988 (bmo#725770) DOS and crash with full screen and history navigation * MFSA 2012-80/CVE-2012-3989 (bmo#783867) Crash with invalid cast when using instanceof operator * MFSA 2012-81/CVE-2012-3991 (bmo#783260) GetProperty function can bypass security checks * MFSA 2012-82/CVE-2012-3994 (bmo#765527) top object and location property accessible by plugins * MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370) Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties * MFSA 2012-84/CVE-2012-3992 (bmo#775009) Spoofing and script injection through location.hash * MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/ CVE-2012-4181/CVE-2012-4182/CVE-2012-4183 Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer * MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/ CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer * MFSA 2012-87/CVE-2012-3990 (bmo#787704) Use-after-free in the IME State Manager OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=192
This commit is contained in:
parent
4100df6994
commit
50b8e0db7c
@ -2,6 +2,36 @@
|
||||
Mon Oct 8 13:27:10 UTC 2012 - wr@rosenauer.org
|
||||
|
||||
- update to Thunderbird 16.0 (bnc#783533)
|
||||
* MFSA 2012-74/CVE-2012-3982/CVE-2012-3983
|
||||
Miscellaneous memory safety hazards
|
||||
* MFSA 2012-75/CVE-2012-3984 (bmo#575294)
|
||||
select element persistance allows for attacks
|
||||
* MFSA 2012-76/CVE-2012-3985 (bmo#655649)
|
||||
Continued access to initial origin after setting document.domain
|
||||
* MFSA 2012-77/CVE-2012-3986 (bmo#775868)
|
||||
Some DOMWindowUtils methods bypass security checks
|
||||
* MFSA 2012-79/CVE-2012-3988 (bmo#725770)
|
||||
DOS and crash with full screen and history navigation
|
||||
* MFSA 2012-80/CVE-2012-3989 (bmo#783867)
|
||||
Crash with invalid cast when using instanceof operator
|
||||
* MFSA 2012-81/CVE-2012-3991 (bmo#783260)
|
||||
GetProperty function can bypass security checks
|
||||
* MFSA 2012-82/CVE-2012-3994 (bmo#765527)
|
||||
top object and location property accessible by plugins
|
||||
* MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370)
|
||||
Chrome Object Wrapper (COW) does not disallow acces to privileged
|
||||
functions or properties
|
||||
* MFSA 2012-84/CVE-2012-3992 (bmo#775009)
|
||||
Spoofing and script injection through location.hash
|
||||
* MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/
|
||||
CVE-2012-4181/CVE-2012-4182/CVE-2012-4183
|
||||
Use-after-free, buffer overflow, and out of bounds read issues
|
||||
found using Address Sanitizer
|
||||
* MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/
|
||||
CVE-2012-4188
|
||||
Heap memory corruption issues found using Address Sanitizer
|
||||
* MFSA 2012-87/CVE-2012-3990 (bmo#787704)
|
||||
Use-after-free in the IME State Manager
|
||||
- update Enigmail to version 1.4.5
|
||||
|
||||
-------------------------------------------------------------------
|
||||
|
Loading…
Reference in New Issue
Block a user