File _patchinfo of Package patchinfo.7619
<patchinfo incident="7619">
<issue tracker="bnc" id="1074043" />
<issue tracker="bnc" id="1074044" />
<issue tracker="bnc" id="1074045" />
<issue tracker="bnc" id="1074046" />
<issue tracker="cve" id="2017-7846" />
<issue tracker="cve" id="2017-7847" />
<issue tracker="cve" id="2017-7848" />
<issue tracker="cve" id="2017-7829" />
<category>security</category>
<rating>important</rating>
<packager>AndreasStieger</packager>
<summary>Security update for Mozilla Thunderbird</summary>
<description>This update for Mozilla Thunderbird to version 52.5.2 fixes the following vulnerabilities:
- CVE-2017-7846: JavaScript Execution via RSS in mailbox:// origin (bsc#1074043)
- CVE-2017-7847: Local path string can be leaked from RSS feed (bsc#1074044)
- CVE-2017-7848: RSS Feed vulnerable to new line Injection (bsc#1074045)
- CVE-2017-7829: From address with encoded null character is cut off in message header display (bsc#1074046)
</description>
</patchinfo>