File _patchinfo of Package patchinfo.6487
<patchinfo incident="6487"> <issue id="1028391" tracker="bnc">VUL-0: MozillaFirefox 52/45.8.0 security release</issue> <issue id="2017-5398" tracker="cve" /> <issue id="2017-5408" tracker="cve" /> <issue id="2017-5405" tracker="cve" /> <issue id="2017-5404" tracker="cve" /> <issue id="2017-5407" tracker="cve" /> <issue id="2017-5401" tracker="cve" /> <issue id="2017-5400" tracker="cve" /> <issue id="2017-5410" tracker="cve" /> <issue id="2017-5402" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>wrosenauer</packager> <description>This update to Mozilla Thunderbird 45.8.0 fixes security issues and bugs. The following security issues from advisory MFSA 2017-07 were fixed. (boo#1028391) In general, these flaws cannot be exploited through email in Thunderbird because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts: - CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP - CVE-2017-5401: Memory Corruption when handling ErrorResult - CVE-2017-5402: Use-after-free working with events in FontFace objects (bmo#1334876) - CVE-2017-5404: Use-after-free working with ranges in selections - CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters - CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping - CVE-2017-5408: Cross-origin reading of video captions in violation of CORS - CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports (bmo#1336699) - CVE-2017-5398: Memory safety bugs fixed in Thunderbird 45.8 The following non-security issues were fixed: - crash when viewing certain IMAP messages </description> <summary>Security update for MozillaThunderbird</summary> </patchinfo>