From fa262559793bc83b3aeff57f4cdaa98119aa8f00a0d37efd0ef24ba0f17f6d99 Mon Sep 17 00:00:00 2001 From: Wolfgang Rosenauer Date: Sat, 23 Dec 2017 21:58:24 +0000 Subject: [PATCH] Accepting request 559653 from home:AndreasStieger:branches:mozilla:Factory changlog OBS-URL: https://build.opensuse.org/request/show/559653 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=395 --- MozillaThunderbird.changes | 14 +++++--------- 1 file changed, 5 insertions(+), 9 deletions(-) diff --git a/MozillaThunderbird.changes b/MozillaThunderbird.changes index f1ced62..dc57ae3 100644 --- a/MozillaThunderbird.changes +++ b/MozillaThunderbird.changes @@ -3,18 +3,14 @@ Sat Dec 23 18:36:42 UTC 2017 - wr@rosenauer.org - update to Thunderbird 52.5.2 * This releases fixes the "Mailsploit" vulnerability and other - vulnerabilities detected by the "Cure53" audit - MFSA 2017-30 - * CVE-2017-7845 (bmo#1402372) - Buffer overflow when drawing and validating elements with ANGLE - library using Direct 3D 9 - * CVE-2017-7846 (bmo#1411716) + vulnerabilities detected by the "Cure53" audit (MFSA 2017-30) + * CVE-2017-7846 (bmo#1411716, bsc#1074043) JavaScript Execution via RSS in mailbox:// origin - * CVE-2017-7847 (bmo#1411708) + * CVE-2017-7847 (bmo#1411708, bsc#1074044) Local path string can be leaked from RSS feed - * CVE-2017-7848 (bmo#1411699) + * CVE-2017-7848 (bmo#1411699, bsc#1074045) RSS Feed vulnerable to new line Injection - * CVE-2017-7829 (bmo#1423432) + * CVE-2017-7829 (bmo#1423432, bsc#1074046) Mailsploit part 1: From address with encoded null character is cut off in message header display