Описание
ELSA-2013-1480: thunderbird security update (IMPORTANT)
[17.0.10-1.0.1.el6_4]
- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js
[17.0.10-1]
- Update to 17.0.10 ESR
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
thunderbird
17.0.10-1.0.1.el5_10
Oracle Linux i386
thunderbird
17.0.10-1.0.1.el5_10
Oracle Linux 6
Oracle Linux x86_64
thunderbird
17.0.10-1.0.1.el6_4
Oracle Linux i686
thunderbird
17.0.10-1.0.1.el6_4
Ссылки на источники
Связанные уязвимости
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWith ...