ALT-PU-2017-2838-1
Package thunderbird updated to version 52.5.2-alt1 for branch sisyphus in task 197444.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7829
It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbird < 52.5.2.
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://usn.ubuntu.com/3529-1/
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://usn.ubuntu.com/3529-1/
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7846
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7847
Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name. This vulnerability affects Thunderbird < 52.5.2.
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7848
RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird < 52.5.2.
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- http://www.securityfocus.com/bid/102258
- http://www.securitytracker.com/id/1040123
- https://access.redhat.com/errata/RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://www.debian.org/security/2017/dsa-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/