Описание
ELSA-2013-0697: thunderbird security update (IMPORTANT)
[17.0.5-1.0.1.el6_4]
- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js
[17.0.5-1]
- Update to 17.0.5 ESR
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
thunderbird
17.0.5-1.0.1.el5_9
Oracle Linux i386
thunderbird
17.0.5-1.0.1.el5_9
Oracle Linux 6
Oracle Linux x86_64
thunderbird
17.0.5-1.0.1.el6_4
Oracle Linux i686
thunderbird
17.0.5-1.0.1.el6_4
Ссылки на источники
Связанные уязвимости
Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
Integer signedness error in the pixman_fill_sse2 function in pixman-ss ...