Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code.
Package | www-client/firefox on all architectures |
---|---|
Affected versions | < 45.6.0 |
Unaffected versions | >= 45.6.0 |
Package | www-client/firefox-bin on all architectures |
---|---|
Affected versions | < 45.6.0 |
Unaffected versions | >= 45.6.0 |
Package | mail-client/thunderbird on all architectures |
---|---|
Affected versions | < 45.6.0 |
Unaffected versions | >= 45.6.0 |
Package | mail-client/thunderbird-bin on all architectures |
---|---|
Affected versions | < 45.6.0 |
Unaffected versions | >= 45.6.0 |
Mozilla Firefox is a cross-platform web browser from Mozilla. The Mozilla Thunderbird mail client is a redesign of the Mozilla Mail component. The goal is to produce a cross-platform stand-alone mail application using XUL (XML User Interface Language).
Multiple vulnerabilities have been discovered in Mozilla Firefox and Thunderbird. Please review the CVE identifiers referenced below for details.
A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition via multiple vectors.
There is no known workaround at this time.
All Firefox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-45.6.0"
All Firefox-bin users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-45.6.0"
All Thunderbird users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-45.6.0"
All Thunderbird-bin users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-45.6.0"