| Summary: | mozilla-thunderbird new security issue CVE-2012-4193 fixed in 10.0.9 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | critical | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | MGA1TOO mga2-64-OK MGA2-32-OK MGA1-64-OK MGA1-32-OK | ||
| Source RPM: | thunderbird, mozilla-thunderbird | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-10-15 14:31:22 CEST
David Walser
2012-10-15 14:31:34 CEST
Whiteboard:
(none) =>
MGA1TOO Tested OK mga2 64 Spelling, imap, nntp, enigmail (signing, verifying, encrypting, decrypting), search, address book etc Whiteboard:
MGA1TOO =>
MGA1TOO mga2-64-OK Testing complete Mageia 2 i586, Mageia 1 x86-64 and i586. Tesing using nntp, pop3, imap, and enigmail. Could someone from the sysadmin team push the srpms thunderbird-10.0.9-1.mga2.src.rpm thunderbird-l10n-10.0.9-1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates and the srpms mozilla-thunderbird-10.0.9-1.mga1.src.rpm mozilla-thunderbird-l10n-10.0.9-1.mga1.src.rpm from Mageia 1 Core Updates Testing to Core Updates. Advisory: Updated mozilla-thunderbird packages fix security vulnerability: A flaw was found in the way Thunderbird handled security wrappers. Malicious content could cause Thunderbird to execute arbitrary code with the privileges of the user running Thunderbird (CVE-2012-4193). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193 http://www.mozilla.org/security/announce/2012/mfsa2012-89.html https://rhn.redhat.com/errata/RHSA-2012-1362.html https://bugs.mageia.org/show_bug.cgi?id=7801 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0296 Status:
NEW =>
RESOLVED |