Описание
ELSA-2012-1362: thunderbird security update (CRITICAL)
[10.0.8-2.0.1.el6_3]
- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js
- Replace clean.gif in tarball
[10.0.8-2]
- Added patches from 10.0.9 ESR
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
thunderbird
10.0.8-2.0.1.el5_8
Oracle Linux i386
thunderbird
10.0.8-2.0.1.el5_8
Oracle Linux 6
Oracle Linux x86_64
thunderbird
10.0.8-2.0.1.el6_3
Oracle Linux i686
thunderbird
10.0.8-2.0.1.el6_3
Связанные CVE
Связанные уязвимости
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunder ...
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.