On 12/01/2016 10:12 AM, NoOp wrote:
> On 12/01/2016 08:40 AM, Lee wrote:
>> On 12/1/16, TCW <"."> wrote:
>>> On 11/30/2016 8:06 AM, WaltS48 wrote:
>>>>> There's a zero-day exploit in the wild that's being used to execute
>>>>> malicious code on the computers of people using Tor and possibly other
>>>>> users of the Firefox browser, officials of the anonymity service
>>>>> confirmed Tuesday.
>>>>>
>>>>
>>>>> The versions span from 41 to 50, with version 45 ESR being the version
>>>>> used by the latest version of the Tor browser.
>>>>
>>>> <http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/>
>>>>
>>>>
>>>> Is a fix for SeaMonkey needed?
>>>
>>> Looks like Adrian has applied it to his 2.47 build @
>>> http://tinyurl.com/j2ju4s7.
>> 
>> Would you please not post obfuscated URLs?  Especially now, in a
>> thread about a 0day & probably most everybody reading the thread
>> running exploitable software, enticing people to click on random links
>> is a really bad idea.
>> 
>> $ curl -s --head  http://tinyurl.com/j2ju4s7 | grep Location
>> Location: 
>> https://l10n.mozilla-community.org/~akalla/unofficial/seamonkey/nightly/latest-comm-release-windows32/
>> 
>> Thanks,
>> Lee
>> 
> 
> Mine updated from 2.46 to2.46 - however on the Windows 10 systems I'm
> getting crashes from these builds:

Correction: ...from 2.46 to 2.47 (release update channel)...

_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to