forked from pool/MozillaThunderbird
Accepting request 577192 from mozilla:Factory
readded lost bsc bugnumbers for Leap 15 increased constraints to give i586 the chance to build again OBS-URL: https://build.opensuse.org/request/show/577192 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/MozillaThunderbird?expand=0&rev=189
This commit is contained in:
commit
bcf6d3e7d7
@ -43,13 +43,13 @@ Sat Dec 23 18:36:42 UTC 2017 - wr@rosenauer.org
|
||||
* CVE-2017-7845 (bmo#1402372)
|
||||
Buffer overflow when drawing and validating elements with ANGLE
|
||||
library using Direct 3D 9
|
||||
* CVE-2017-7846 (bmo#1411716)
|
||||
* CVE-2017-7846 (bmo#1411716, bsc#1074043)
|
||||
JavaScript Execution via RSS in mailbox:// origin
|
||||
* CVE-2017-7847 (bmo#1411708)
|
||||
* CVE-2017-7847 (bmo#1411708, bsc#1074044)
|
||||
Local path string can be leaked from RSS feed
|
||||
* CVE-2017-7848 (bmo#1411699)
|
||||
* CVE-2017-7848 (bmo#1411699, bsc#1074045)
|
||||
RSS Feed vulnerable to new line Injection
|
||||
* CVE-2017-7829 (bmo#1423432)
|
||||
* CVE-2017-7829 (bmo#1423432, bsc#1074046)
|
||||
Mailsploit part 1: From address with encoded null character is
|
||||
cut off in message header display
|
||||
|
||||
|
@ -2,10 +2,10 @@
|
||||
<constraints>
|
||||
<hardware>
|
||||
<disk>
|
||||
<size unit="G">13</size>
|
||||
<size unit="G">16</size>
|
||||
</disk>
|
||||
<memory>
|
||||
<size unit="M">6000</size>
|
||||
<size unit="M">9000</size>
|
||||
</memory>
|
||||
</hardware>
|
||||
</constraints>
|
||||
|
Loading…
Reference in New Issue
Block a user