Saturday, November 21, 2015
Mozilla Thunderbird 31.4.0 Mail Client officially arrives in Ubuntu Repository
Canonical and Ubuntu team officially updated the newer version of Mozilla Thunderbird 31.4.0 mail client in their repository, so that users of Ubuntu derivative can update their Thunderbird to newer version. The Ubuntu developers noticed some of the issues which are fixed in this release.
According to official announcement, Thunderbird 31.4.0 mail client is currently available for Ubuntu 14.10, Ubuntu 14.04 LTS and Ubuntu 12.04 LTS. Well this updated version primarily includes several security issue fixes which were reported in previous release. We have also discussed some of the issues which are discovered by developers in this release.
The Christian Holler and Patrick McManus discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash or execute arbitary code with the privileges of the user invoking Thunderbird.
Muneaki Nishimura discovered that requests from navigator.sendBeacon() lack an origin header. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this conduct cross-site request forgery (XSRF) attacks. You might also like to check out other latest Software News to know what's new in them ?
Keep reading and stay tuned with us to get latest software updates. Don't forget to subscribe us and share your reviews about this post among other readers via comments.
According to official announcement, Thunderbird 31.4.0 mail client is currently available for Ubuntu 14.10, Ubuntu 14.04 LTS and Ubuntu 12.04 LTS. Well this updated version primarily includes several security issue fixes which were reported in previous release. We have also discussed some of the issues which are discovered by developers in this release.
The Christian Holler and Patrick McManus discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash or execute arbitary code with the privileges of the user invoking Thunderbird.
Muneaki Nishimura discovered that requests from navigator.sendBeacon() lack an origin header. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this conduct cross-site request forgery (XSRF) attacks. You might also like to check out other latest Software News to know what's new in them ?
Keep reading and stay tuned with us to get latest software updates. Don't forget to subscribe us and share your reviews about this post among other readers via comments.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment