Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0697

Опубликовано: 02 апр. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2013-0697: thunderbird security update (IMPORTANT)

[17.0.5-1.0.1.el6_4]

  • Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js

[17.0.5-1]

  • Update to 17.0.5 ESR

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

thunderbird

17.0.5-1.0.1.el5_9

Oracle Linux i386

thunderbird

17.0.5-1.0.1.el5_9

Oracle Linux 6

Oracle Linux x86_64

thunderbird

17.0.5-1.0.1.el6_4

Oracle Linux i686

thunderbird

17.0.5-1.0.1.el6_4

Связанные уязвимости

oracle-oval
больше 12 лет назад

ELSA-2013-0696: firefox security update (CRITICAL)

ubuntu
больше 12 лет назад

Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.

redhat
больше 12 лет назад

Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.

nvd
больше 12 лет назад

Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.

debian
больше 12 лет назад

Integer signedness error in the pixman_fill_sse2 function in pixman-ss ...