Mozilla Firefox, Thunderbird: Multiple vulnerabilities — GLSA 201701-15

Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code.

Affected packages

www-client/firefox on all architectures
Affected versions < 45.6.0
Unaffected versions >= 45.6.0
www-client/firefox-bin on all architectures
Affected versions < 45.6.0
Unaffected versions >= 45.6.0
mail-client/thunderbird on all architectures
Affected versions < 45.6.0
Unaffected versions >= 45.6.0
mail-client/thunderbird-bin on all architectures
Affected versions < 45.6.0
Unaffected versions >= 45.6.0

Background

Mozilla Firefox is a cross-platform web browser from Mozilla. The Mozilla Thunderbird mail client is a redesign of the Mozilla Mail component. The goal is to produce a cross-platform stand-alone mail application using XUL (XML User Interface Language).

Description

Multiple vulnerabilities have been discovered in Mozilla Firefox and Thunderbird. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition via multiple vectors.

Workaround

There is no known workaround at this time.

Resolution

All Firefox users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/firefox-45.6.0"
 

All Firefox-bin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-45.6.0"
 

All Thunderbird users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-45.6.0"
 

All Thunderbird-bin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=mail-client/thunderbird-bin-45.6.0"
 

References

Release date
January 03, 2017

Latest revision
January 04, 2017: 2

Severity
normal

Exploitable
remote

Bugzilla entries