Synopsis: Important: thunderbird security update Advisory ID: SLSA-2015:2519-1 Issue Date: 2015-11-26 CVE Numbers: CVE-2015-4513 CVE-2015-7189 CVE-2015-7193 CVE-2015-7198 CVE-2015-7197 CVE-2015-7199 CVE-2015-7200 -- Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200) A same-origin policy bypass flaw was found in the way Thunderbird handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Thunderbird to disclose sensitive information. (CVE-2015-7193) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). After installing the update, Thunderbird must be restarted for the changes to take effect. -- SL5 x86_64 thunderbird-38.4.0-1.el5_11.x86_64.rpm thunderbird-debuginfo-38.4.0-1.el5_11.x86_64.rpm i386 thunderbird-38.4.0-1.el5_11.i386.rpm thunderbird-debuginfo-38.4.0-1.el5_11.i386.rpm SL6 x86_64 thunderbird-38.4.0-1.el6_7.x86_64.rpm thunderbird-debuginfo-38.4.0-1.el6_7.x86_64.rpm i386 thunderbird-38.4.0-1.el6_7.i686.rpm thunderbird-debuginfo-38.4.0-1.el6_7.i686.rpm SL7 x86_64 thunderbird-38.4.0-1.el7_2.x86_64.rpm thunderbird-debuginfo-38.4.0-1.el7_2.x86_64.rpm - Scientific Linux Development Team