firefox/thunderbird is vulnerable to arbitrary code execution. A use-after-free vulnerability in the function nsHtml5TreeOperation
in xul.dll
allows a remote attacker to execute arbitrary code via a second root element to an HTML5 document.
lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
www.debian.org/security/2014/dsa-3090
www.debian.org/security/2014/dsa-3092
www.mozilla.org/security/announce/2014/mfsa2014-87.html
www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
www.securityfocus.com/bid/71398
access.redhat.com/articles/1283153
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=1088635
rhn.redhat.com/errata/RHSA-2014-1919.html
security.gentoo.org/glsa/201504-01
www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr31.3