Mozilla Foundation Security Advisory 2018-18 Security vulnerabilities fixed in Thunderbird 52.9 Announced July 3, 2018 Impact critical Products Thunderbird Fixed in Thunderbird 52.9 In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. [ https://www.mozilla.org/en-US/security/advisories/mfsa2018-18/ ]
That was quick! CONFIRMATION: WORKSFORME on x64: # uname -a Linux XXXX 4.17.4-gentoo #1 SMP Tue Jul 3 23:48:24 CEST 2018 x86_64 Intel(R) Xeon(R) CPU E3-1276 v3 @ 3.60GHz GenuineIntel GNU/Linux >>> Verifying ebuild manifests >>> Running pre-merge checks for mail-client/thunderbird-52.9.0 >>> Emerging (1 of 1) mail-client/thunderbird-52.9.0::gentoo >>> Installing (1 of 1) mail-client/thunderbird-52.9.0::gentoo >>> Jobs: 1 of 1 complete With compliments
*** This bug has been marked as a duplicate of bug 656092 ***
(In reply to Jory A. Pratt from comment #2) > > *** This bug has been marked as a duplicate of bug 656092 *** ....................................^^^^^^^^^ I disagree: - bug 656092 is about - - MFSA-2018-13 - - <mail-client/thunderbird{-bin}-52.8.0 - - ..................................^ - bug 660376 (this one) is about - mfsa2018-18 - - <mail-client/thunderbird{-bin}-52.9.0 - - ..................................^ Nevertheless, the latest version bump # equery list -p thunderbird* [IP-] [ ] mail-client/thunderbird-52.9.0:0 [-P-] [ ] mail-client/thunderbird-bin-52.9.0:0 solves the issue: Thanks again !