Changelog for
MozillaThunderbird-devel-17.0.5-61.9.4.x86_64.rpm :
* Fri Mar 29 2013 wrAATTrosenauer.org- update to Thunderbird 17.0.5 (bnc#813026)
* requires NSPR 4.9.5 and NSS 3.14.3
* MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous memory safety hazards
* MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds write in Cairo library
* MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash with Mesa graphics driver on Linux
* MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW protections allows cloning of protected nodes
* MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site scripting (XSS) using timed history navigations
* Fri Mar 08 2013 wrAATTrosenauer.org- update to Thunderbird 17.0.4 (bnc#808243)
* MFSA 2013-29/CVE-2013-0787 (bmo#848644) Use-after-free in HTML Editor
* Sun Feb 17 2013 wrAATTrosenauer.org- update to Thunderbird 17.0.3 (bnc#804248)
* MFSA 2013-21/CVE-2013-0783 Miscellaneous memory safety hazards
* MFSA 2013-24/CVE-2013-0773 (bmo#809652) Web content bypass of COW and SOW security wrappers
* MFSA 2013-25/CVE-2013-0774 (bmo#827193) Privacy leak in JavaScript Workers
* MFSA 2013-26/CVE-2013-0775 (bmo#831095) Use-after-free in nsImageLoadingContent
* MFSA 2013-27/CVE-2013-0776 (bmo#796475) Phishing on HTTPS connection through malicious proxy
* MFSA 2013-28/CVE-2013-0780/CVE-2013-0782 Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer
* Mon Feb 11 2013 wrAATTrosenauer.org- update Enigmail to 1.5.1
* The release fixes the regressions found in the past few weeks
* Sat Jan 05 2013 wrAATTrosenauer.org- update to Thunderbird 17.0.2 (bnc#796895)
* MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770 Miscellaneous memory safety hazards
* MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0767 CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829 Use-after-free and buffer overflow issues found using Address Sanitizer
* MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow in Canvas
* MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in addressbar during page loads
* MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free when displaying table with many columns and column groups
* MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to handling of SSL on threads
* MFSA 2013-08/CVE-2013-0745 (bmo#794158) AutoWrapperChanger fails to keep objects alive during garbage collection
* MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment mismatch with quickstubs returned values
* MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event manipulation in plugin handler to bypass same-origin policy
* MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space layout leaked in XBL objects
* MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow in Javascript string concatenation
* MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption in XBL with XML bindings containing SVG
* MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object Wrapper (COW) bypass through changing prototype
* MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege escalation through plugin objects
* MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in serializeToStream
* MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in ListenerManager
* MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in Vibrate
* MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in Javascript Proxy objects- requires NSS 3.14.1 (MFSA 2013-20, CVE-2013-0743)- update Enigmail to 1.5.0
* Mon Nov 26 2012 wrAATTrosenauer.org- fix KDE integration for file dialogs- fix some rpmlint warnings (mkdir.done files)- build on SLE11
* mozilla-gcc43-enums.patch
* mozilla-gcc43-template_hacks.patch
* mozilla-gcc43-templates_instantiation.patch
* Tue Nov 20 2012 wrAATTrosenauer.org- update to Thunderbird 17.0 (bnc#790140)
* MFSA 2012-91/CVE-2012-5842/CVE-2012-5843 Miscellaneous memory safety hazards
* MFSA 2012-92/CVE-2012-4202 (bmo#758200) Buffer overflow while rendering GIF images
* MFSA 2012-93/CVE-2012-4201 (bmo#747607) evalInSanbox location context incorrectly applied
* MFSA 2012-94/CVE-2012-5836 (bmo#792857) Crash when combining SVG text on path with CSS
* MFSA 2012-96/CVE-2012-4204 (bmo#778603) Memory corruption in str_unescape
* MFSA 2012-97/CVE-2012-4205 (bmo#779821) XMLHttpRequest inherits incorrect principal within sandbox
* MFSA 2012-99/CVE-2012-4208 (bmo#798264) XrayWrappers exposes chrome-only properties when not in chrome compartment
* MFSA 2012-100/CVE-2012-5841 (bmo#805807) Improper security filtering for cross-origin wrappers
* MFSA 2012-101/CVE-2012-4207 (bmo#801681) Improper character decoding in HZ-GB-2312 charset
* MFSA 2012-102/CVE-2012-5837 (bmo#800363) Script entered into Developer Toolbar runs with chrome privileges
* MFSA 2012-103/CVE-2012-4209 (bmo#792405) Frames can shadow top.location
* MFSA 2012-105/CVE-2012-4214/CVE-2012-4215/CVE-2012-4216/ CVE-2012-5829/CVE-2012-5839/CVE-2012-5840/CVE-2012-4212/ CVE-2012-4213/CVE-2012-4217/CVE-2012-4218 Use-after-free and buffer overflow issues found using Address Sanitizer
* MFSA 2012-106/CVE-2012-5830/CVE-2012-5833/CVE-2012-5835/CVE-2012-5838 Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer- rebased patches- disabled WebRTC since build is broken (bmo#776877)- update Enigmail to 1.4.6
* Sat Oct 27 2012 wrAATTrosenauer.org- update to Thunderbird 16.0.2 (bnc#786522)
* MFSA 2012-90/CVE-2012-4194/CVE-2012-4195/CVE-2012-4196 (bmo#800666, bmo#793121, bmo#802557) Fixes for Location object issues
* Thu Oct 11 2012 wrAATTrosenauer.org- update to Thunderbird 16.0.1 (bnc#783533)
* MFSA 2012-88/CVE-2012-4191 (bmo#798045) Miscellaneous memory safety hazards
* MFSA 2012-89/CVE-2012-4192/CVE-2012-4193 (bmo#799952, bmo#720619) defaultValue security checks not applied
* Mon Oct 08 2012 wrAATTrosenauer.org- update to Thunderbird 16.0 (bnc#783533)
* MFSA 2012-74/CVE-2012-3982/CVE-2012-3983 Miscellaneous memory safety hazards
* MFSA 2012-75/CVE-2012-3984 (bmo#575294) select element persistance allows for attacks
* MFSA 2012-76/CVE-2012-3985 (bmo#655649) Continued access to initial origin after setting document.domain
* MFSA 2012-77/CVE-2012-3986 (bmo#775868) Some DOMWindowUtils methods bypass security checks
* MFSA 2012-79/CVE-2012-3988 (bmo#725770) DOS and crash with full screen and history navigation
* MFSA 2012-80/CVE-2012-3989 (bmo#783867) Crash with invalid cast when using instanceof operator
* MFSA 2012-81/CVE-2012-3991 (bmo#783260) GetProperty function can bypass security checks
* MFSA 2012-82/CVE-2012-3994 (bmo#765527) top object and location property accessible by plugins
* MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370) Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties
* MFSA 2012-84/CVE-2012-3992 (bmo#775009) Spoofing and script injection through location.hash
* MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/ CVE-2012-4181/CVE-2012-4182/CVE-2012-4183 Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer
* MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/ CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer
* MFSA 2012-87/CVE-2012-3990 (bmo#787704) Use-after-free in the IME State Manager- update Enigmail to version 1.4.5
* Sun Aug 26 2012 wrAATTrosenauer.org- update to Thunderbird 15.0 (bnc#777588)
* MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety hazards
* MFSA 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1975 CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-2012-3959 CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-2012-3964 Use-after-free issues found using Address Sanitizer
* MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object can be shadowed using Object.defineProperty
* MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793) Memory corruption with bitmap format images with negative height
* MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL use-after-free and memory corruption
* MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer overflow and use-after-free issues
* MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption
* MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds read in format-number in XSLT
* MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads linked resources in extensions when parsing text/html
* MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object security checks bypassed by chrome code
* MFSA 2012-72/CVE-2012-3980 (bmo#771859) Web console eval capable of executing chrome-privileged code- update Enigmail to 1.4.4
* Sun Jul 29 2012 ajAATTsuse.de- Fix mozilla-kde.patch to include sys/resource.h for getrlimit etc (glibc 2.16)
* Sun Jul 15 2012 wrAATTrosenauer.org- update to Thunderbird 14.0 (bnc#771583)
* MFSA 2012-42/CVE-2012-1949/CVE-2012-1948 Miscellaneous memory safety hazards
* MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952 Gecko memory corruption
* MFSA 2012-45/CVE-2012-1955 (bmo#757376) Spoofing issue with location
* MFSA 2012-47/CVE-2012-1957 (bmo#750096) Improper filtering of javascript in HTML feed-view
* MFSA 2012-48/CVE-2012-1958 (bmo#750820) use-after-free in nsGlobalWindow::PageHidden
* MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559) Same-compartment Security Wrappers can be bypassed
* MFSA 2012-50/CVE-2012-1960 (bmo#761014) Out of bounds read in QCMS
* MFSA 2012-51/CVE-2012-1961 (bmo#761655) X-Frame-Options header ignored when duplicated
* MFSA 2012-52/CVE-2012-1962 (bmo#764296) JSDependentString::undepend string conversion results in memory corruption
* MFSA 2012-53/CVE-2012-1963 (bmo#767778) Content Security Policy 1.0 implementation errors cause data leakage
* MFSA 2012-56/CVE-2012-1967 (bmo#758344) Code execution through javascript: URLs
* relicensed to MPL-2.0- update Enigmail to 1.4.3
* Thu Jul 05 2012 adrianAATTsuse.de- no crashreport on %arm, fixing build
* Fri Jun 15 2012 wrAATTrosenauer.org- update to Thunderbird 13.0.1
* bugfix release
* Sat Jun 02 2012 wrAATTrosenauer.org- update to Thunderbird 13.0 (bnc#765204)
* MFSA 2012-34/CVE-2012-1938/CVE-2012-1937/CVE-2011-3101 Miscellaneous memory safety hazards
* MFSA 2012-36/CVE-2012-1944 (bmo#751422) Content Security Policy inline-script bypass
* MFSA 2012-37/CVE-2012-1945 (bmo#670514) Information disclosure though Windows file shares and shortcut files
* MFSA 2012-38/CVE-2012-1946 (bmo#750109) Use-after-free while replacing/inserting a node in a document
* MFSA 2012-40/CVE-2012-1947/CVE-2012-1940/CVE-2012-1941 Buffer overflow and use-after-free issues found using Address Sanitizer- require NSS 3.13.4
* MFSA 2012-39/CVE-2012-0441 (bmo#715073)- fix build with system NSPR (mozilla-system-nspr.patch)- add dependentlibs.list for improved XRE startup- update enigmail to 1.4.2
* Wed May 16 2012 wrAATTrosenauer.org- reenabled crashreporter for Factory/12.2 (fix in mozilla-gcc47.patch)
* Mon Apr 30 2012 wrAATTrosenauer.org- update to Thunderbird 12.0.1
* fix regressions - POP3 filters (bmo#748090) - Message Body not loaded when using \"Fetch Headers Only\" (bmo#748865) - Received messages contain parts of other messages with movemail account (bmo#748726) - New mail notification issue (bmo#748997) - crash in nsMsgDatabase::MatchDbName (bmo#748432)
* Fri Apr 27 2012 wrAATTrosenauer.org- fixed build with gcc 4.7
* Sat Apr 21 2012 wrAATTrosenauer.org- update to Thunderbird 12.0 (bnc#758408)
* MFSA 2012-20/CVE-2012-0467/CVE-2012-0468 Miscellaneous memory safety hazards
* MFSA 2012-22/CVE-2012-0469 (bmo#738985) use-after-free in IDBKeyRange
* MFSA 2012-23/CVE-2012-0470 (bmo#734288) Invalid frees causes heap corruption in gfxImageSurface
* MFSA 2012-24/CVE-2012-0471 (bmo#715319) Potential XSS via multibyte content processing errors
* MFSA 2012-25/CVE-2012-0472 (bmo#744480) Potential memory corruption during font rendering using cairo-dwrite
* MFSA 2012-26/CVE-2012-0473 (bmo#743475) WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error
* MFSA 2012-27/CVE-2012-0474 (bmo#687745, bmo#737307) Page load short-circuit can lead to XSS
* MFSA 2012-28/CVE-2012-0475 (bmo#694576) Ambiguous IPv6 in Origin headers may bypass webserver access restrictions
* MFSA 2012-29/CVE-2012-0477 (bmo#718573) Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues
* MFSA 2012-30/CVE-2012-0478 (bmo#727547) Crash with WebGL content using textImage2D
* MFSA 2012-31/CVE-2011-3062 (bmo#739925) Off-by-one error in OpenType Sanitizer
* MFSA 2012-32/CVE-2011-1187 (bmo#624621) HTTP Redirections and remote content can be read by javascript errors
* MFSA 2012-33/CVE-2012-0479 (bmo#714631) Potential site identity spoofing when loading RSS and Atom feeds- update Enigmail to 1.4.1- added mozilla-revert_621446.patch- added mozilla-libnotify.patch (bmo#737646)- added mailnew-showalert.patch (bmo#739146)- added mozilla-gcc47.patch and mailnews-literals.patch to fix compilation issues with recent gcc 4.7- disabled crashreporter temporarily for Factory (gcc 4.7 issue)
* Tue Mar 27 2012 wrAATTrosenauer.org- update to Thunderbird 11.0.1 (bnc#755060)
* Fixing an issue where filters can get messed up (bmo#735940)
* Fixes a hang when switching IMAP folders, or doing other imap functions (bmo#733731)
* Fri Mar 09 2012 wrAATTrosenauer.org- update to Thunderbird 11.0 (bnc#750044)
* MFSA 2012-13/CVE-2012-0455 (bmo#704354) XSS with Drag and Drop and Javascript: URL
* MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103) SVG issues found with Address Sanitizer
* MFSA 2012-15/CVE-2012-0451 (bmo#717511) XSS with multiple Content Security Policy headers
* MFSA 2012-16/CVE-2012-0458 Escalation of privilege with Javascript: URL as home page
* MFSA 2012-17/CVE-2012-0459 (bmo#723446) Crash when accessing keyframe cssText after dynamic modification
* MFSA 2012-18/CVE-2012-0460 (bmo#727303) window.fullScreen writeable by untrusted content
* MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/ CVE-2012-0463 Miscellaneous memory safety hazards- update enigmail to 1.4- added KDE integration patches (bnc#749440)
* Mon Feb 27 2012 jslabyAATTsuse.de- update enigmail to 1.3.99 (1.4a1pre)
* Thu Feb 16 2012 wrAATTrosenauer.org- update to Thunderbird 10.0.2 (bnc#747328)
* CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow
* Thu Feb 09 2012 wrAATTrosenauer.org- update to version 10.0.1 (bnc#746616)
* MFSA 2012-10/CVE-2012-0452 (bmo#724284) use after free in nsXBLDocumentInfo::ReadPrototypeBindings- Use YARR interpreter instead of PCRE on platforms where YARR JIT is not supported, since PCRE doesnt build (bmo#691898)- fix ppc64 build (bmo#703534)
* Sun Jan 29 2012 wrAATTrosenauer.org- update to version 10.0 (bnc#744275)
* MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards
* MFSA 2012-03/CVE-2012-0445 (bmo#701071)