File _patchinfo of Package patchinfo.7619

<patchinfo incident="7619">
  <issue tracker="bnc" id="1074043" />
  <issue tracker="bnc" id="1074044" />
  <issue tracker="bnc" id="1074045" /> 
  <issue tracker="bnc" id="1074046" />
  <issue tracker="cve" id="2017-7846" />
  <issue tracker="cve" id="2017-7847" />
  <issue tracker="cve" id="2017-7848" />
  <issue tracker="cve" id="2017-7829" />
  <category>security</category>
  <rating>important</rating>
  <packager>AndreasStieger</packager>
  <summary>Security update for Mozilla Thunderbird</summary>
  <description>This update for Mozilla Thunderbird to version 52.5.2 fixes the following vulnerabilities:
  
- CVE-2017-7846: JavaScript Execution via RSS in mailbox:// origin (bsc#1074043)
- CVE-2017-7847: Local path string can be leaked from RSS feed (bsc#1074044)
- CVE-2017-7848: RSS Feed vulnerable to new line Injection (bsc#1074045)
- CVE-2017-7829: From address with encoded null character is cut off in message header display (bsc#1074046)
</description>
</patchinfo>
openSUSE Build Service is sponsored by