Hello community, here is the log from the commit of package patchinfo.5567 for openSUSE:13.2:Update checked in at 2016-09-06 20:46:11 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5567 (Old) and /work/SRC/openSUSE:13.2:Update/.patchinfo.5567.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "patchinfo.5567" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="5567"> <issue id="990856" tracker="bnc">VUL-1: CVE-2016-6354: flex,flex-old: buffer overflow in generated code (yy_get_next_buffer)</issue> <issue id="991809" tracker="bnc">VUL-0: MozillaFirefox: multiple vulnerabilities fixed in 48.0/45.3</issue> <issue id="2016-2830" tracker="cve" /> <issue id="2016-2836" tracker="cve" /> <issue id="2016-2837" tracker="cve" /> <issue id="2016-2838" tracker="cve" /> <issue id="2016-2839" tracker="cve" /> <issue id="2016-5265" tracker="cve" /> <issue id="2016-5259" tracker="cve" /> <issue id="2016-5258" tracker="cve" /> <issue id="2016-5262" tracker="cve" /> <issue id="2016-5263" tracker="cve" /> <issue id="2016-5254" tracker="cve" /> <issue id="2016-5252" tracker="cve" /> <issue id="2016-5264" tracker="cve" /> <issue id="2016-6354" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>wrosenauer</packager> <description> This update for MozillaThunderbird fixes the following issues: - update to Thunderbird 45.3.0 (boo#991809) * Disposition-Notification-To could not be used in mail.compose.other.header * "edit as new message" on a received message pre-filled the sender as the composing identity. * Certain messages caused corruption of the drafts summary database. security fixes: * MFSA 2016-62/CVE-2016-2836 Miscellaneous memory safety hazards * MFSA 2016-63/CVE-2016-2830 (bmo#1255270) Favicon network connection can persist when page is closed * MFSA 2016-64/CVE-2016-2838 (bmo#1279814) Buffer overflow rendering SVG with bidirectional content * MFSA 2016-65/CVE-2016-2839 (bmo#1275339) Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 * MFSA 2016-67/CVE-2016-5252 (bmo#1268854) Stack underflow during 2D graphics rendering * MFSA 2016-70/CVE-2016-5254 (bmo#1266963) Use-after-free when using alt key and toplevel menus * MFSA 2016-72/CVE-2016-5258 (bmo#1279146) Use-after-free in DTLS during WebRTC session shutdown * MFSA 2016-73/CVE-2016-5259 (bmo#1282992) Use-after-free in service workers with nested sync events * MFSA 2016-76/CVE-2016-5262 (bmo#1277475) Scripts on marquee tag can execute in sandboxed iframes * MFSA 2016-77/CVE-2016-2837 (bmo#1274637) Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback * MFSA 2016-78/CVE-2016-5263 (bmo#1276897) Type confusion in display transformation * MFSA 2016-79/CVE-2016-5264 (bmo#1286183) Use-after-free when applying SVG effects * MFSA 2016-80/CVE-2016-5265 (bmo#1278013) Same-origin policy violation using local HTML file and saved shortcut file - Fix for possible buffer overrun (boo#990856) CVE-2016-6354 (bmo#1292534) [mozilla-flex_buffer_overrun.patch] - add a screenshot to appdata.xml </description> <summary>Security update for MozillaThunderbird</summary> </patchinfo>