From 77c48f27072c09a4177a3aea6b312b888c8e08f30c17bf77a0dd90e2ab91fe69 Mon Sep 17 00:00:00 2001 From: Wolfgang Rosenauer Date: Fri, 16 Feb 2018 09:09:25 +0000 Subject: [PATCH] * CVE-2017-7846 (bmo#1411716, bsc#1074043) * CVE-2017-7847 (bmo#1411708, bsc#1074044) * CVE-2017-7848 (bmo#1411699, bsc#1074045) * CVE-2017-7829 (bmo#1423432, bsc#1074046) OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=399 --- MozillaThunderbird.changes | 8 ++++---- _constraints | 4 ++-- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/MozillaThunderbird.changes b/MozillaThunderbird.changes index e8f8d50..f634a98 100644 --- a/MozillaThunderbird.changes +++ b/MozillaThunderbird.changes @@ -43,13 +43,13 @@ Sat Dec 23 18:36:42 UTC 2017 - wr@rosenauer.org * CVE-2017-7845 (bmo#1402372) Buffer overflow when drawing and validating elements with ANGLE library using Direct 3D 9 - * CVE-2017-7846 (bmo#1411716) + * CVE-2017-7846 (bmo#1411716, bsc#1074043) JavaScript Execution via RSS in mailbox:// origin - * CVE-2017-7847 (bmo#1411708) + * CVE-2017-7847 (bmo#1411708, bsc#1074044) Local path string can be leaked from RSS feed - * CVE-2017-7848 (bmo#1411699) + * CVE-2017-7848 (bmo#1411699, bsc#1074045) RSS Feed vulnerable to new line Injection - * CVE-2017-7829 (bmo#1423432) + * CVE-2017-7829 (bmo#1423432, bsc#1074046) Mailsploit part 1: From address with encoded null character is cut off in message header display diff --git a/_constraints b/_constraints index 360c8e3..5d10423 100644 --- a/_constraints +++ b/_constraints @@ -2,10 +2,10 @@ - 13 + 16 - 6000 + 9000