File _patchinfo of Package patchinfo.6880
<patchinfo incident="6880">
<category>security</category>
<rating>moderate</rating>
<packager>AndreasStieger</packager>
<summary>Security update for Mozilla Thunderbird</summary>
<description>This update to Thunderbird 52.2 fixes security issues and bugs.
The following vulnerabilities were fixed:
* CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
* CVE-2017-7749: Use-after-free during docshell reloading
* CVE-2017-7750: Use-after-free with track elements
* CVE-2017-7751: Use-after-free with content viewer listeners
* CVE-2017-7752: Use-after-free with IME input
* CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
* CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
* CVE-2017-7757: Use-after-free in IndexedDB
* CVE-2017-7778, CVE-2017-7778, CVE-2017-7771, CVE-2017-7772,
CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776,
CVE-2017-7777: Vulnerabilities in the Graphite 2 library
* CVE-2017-7758: Out-of-bounds read in Opus encoder
* CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks
* CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
Mozilla Thunderbird now requires NSS 3.28.5.
The following bugs were fixed:
* Embedded images not shown in email received from Hotmail/Outlook webmailer
* Detection of non-ASCII font names in font selector
* Attachment not forwarded correctly under certain circumstances
* Multiple requests for master password when GMail OAuth2 is enabled
* Large number of blank pages being printed under certain circumstances when invalid preferences were present
* Messages sent via the Simple MAPI interface are forced to HTML
* Calendar: Invitations can't be printed
* Mailing list (group) not accessible from macOS or Outlook address book
* Clicking on links with references/anchors where target doesn't exist in the message not opening in external browser
</description>
<issue tracker="cve" id="2017-5470"/>
<issue tracker="cve" id="2017-5472"/>
<issue tracker="cve" id="2017-7749"/>
<issue tracker="cve" id="2017-7750"/>
<issue tracker="cve" id="2017-7751"/>
<issue tracker="cve" id="2017-7752"/>
<issue tracker="cve" id="2017-7754"/>
<issue tracker="cve" id="2017-7756"/>
<issue tracker="cve" id="2017-7757"/>
<issue tracker="cve" id="2017-7758"/>
<issue tracker="cve" id="2017-7763"/>
<issue tracker="cve" id="2017-7764"/>
<issue tracker="cve" id="2017-7765"/>
<issue tracker="cve" id="2017-7771"/>
<issue tracker="cve" id="2017-7772"/>
<issue tracker="cve" id="2017-7773"/>
<issue tracker="cve" id="2017-7774"/>
<issue tracker="cve" id="2017-7775"/>
<issue tracker="cve" id="2017-7776"/>
<issue tracker="cve" id="2017-7777"/>
<issue tracker="cve" id="2017-7778"/>
<issue tracker="bnc" id="1040105"/>
<issue tracker="bnc" id="1042090"/>
<issue tracker="bmo" id="1273265"/>
<issue tracker="bmo" id="1355039"/>
<issue tracker="bmo" id="1356558"/>
<issue tracker="bmo" id="1356824"/>
<issue tracker="bmo" id="1357090"/>
<issue tracker="bmo" id="1359547"/>
<issue tracker="bmo" id="1363396"/>
<issue tracker="bmo" id="1364283"/>
<issue tracker="bmo" id="1365602"/>
<issue tracker="bmo" id="1366595"/>
<issue tracker="bmo" id="1368490"/>
<issue tracker="bnc" id="1043960"/>
<issue tracker="bmo" id="1360309"/>
</patchinfo>