Hello community,

here is the log from the commit of package patchinfo.5567 for 
openSUSE:13.2:Update checked in at 2016-09-06 20:46:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5567 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.5567.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.5567"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="5567">
 <issue id="990856" tracker="bnc">VUL-1: CVE-2016-6354: flex,flex-old: buffer 
overflow in generated code (yy_get_next_buffer)</issue>
  <issue id="991809" tracker="bnc">VUL-0: MozillaFirefox: multiple 
vulnerabilities fixed in 48.0/45.3</issue>
  <issue id="2016-2830" tracker="cve" />
  <issue id="2016-2836" tracker="cve" />
  <issue id="2016-2837" tracker="cve" />
  <issue id="2016-2838" tracker="cve" />
  <issue id="2016-2839" tracker="cve" />
  <issue id="2016-5265" tracker="cve" />
  <issue id="2016-5259" tracker="cve" />
  <issue id="2016-5258" tracker="cve" />
  <issue id="2016-5262" tracker="cve" />
  <issue id="2016-5263" tracker="cve" />
  <issue id="2016-5254" tracker="cve" />
  <issue id="2016-5252" tracker="cve" />
  <issue id="2016-5264" tracker="cve" />
  <issue id="2016-6354" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>wrosenauer</packager>
  <description>
This update for MozillaThunderbird fixes the following issues:

- update to Thunderbird 45.3.0 (boo#991809)
  * Disposition-Notification-To could not be used in
    mail.compose.other.header
  * "edit as new message" on a received message pre-filled the sender
    as the composing identity.
  * Certain messages caused corruption of the drafts summary database.
  security fixes:
  * MFSA 2016-62/CVE-2016-2836
    Miscellaneous memory safety hazards
  * MFSA 2016-63/CVE-2016-2830 (bmo#1255270)
    Favicon network connection can persist when page is closed
  * MFSA 2016-64/CVE-2016-2838 (bmo#1279814)
    Buffer overflow rendering SVG with bidirectional content
  * MFSA 2016-65/CVE-2016-2839 (bmo#1275339)
    Cairo rendering crash due to memory allocation issue with FFmpeg 0.10
  * MFSA 2016-67/CVE-2016-5252 (bmo#1268854)
    Stack underflow during 2D graphics rendering
  * MFSA 2016-70/CVE-2016-5254 (bmo#1266963)
    Use-after-free when using alt key and toplevel menus
  * MFSA 2016-72/CVE-2016-5258 (bmo#1279146)
    Use-after-free in DTLS during WebRTC session shutdown
  * MFSA 2016-73/CVE-2016-5259 (bmo#1282992)
    Use-after-free in service workers with nested sync events
  * MFSA 2016-76/CVE-2016-5262 (bmo#1277475)
    Scripts on marquee tag can execute in sandboxed iframes
  * MFSA 2016-77/CVE-2016-2837 (bmo#1274637)
    Buffer overflow in ClearKey Content Decryption Module (CDM)
    during video playback
  * MFSA 2016-78/CVE-2016-5263 (bmo#1276897)
    Type confusion in display transformation
  * MFSA 2016-79/CVE-2016-5264 (bmo#1286183)
    Use-after-free when applying SVG effects
  * MFSA 2016-80/CVE-2016-5265 (bmo#1278013)
    Same-origin policy violation using local HTML file and saved shortcut file

- Fix for possible buffer overrun (boo#990856)
  CVE-2016-6354 (bmo#1292534)
  [mozilla-flex_buffer_overrun.patch]

- add a screenshot to appdata.xml
</description>
  <summary>Security update for MozillaThunderbird</summary>
</patchinfo>

Reply via email to