From secunia security advisory at $URL:
Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose certain system and sensitive information, bypass certain security restrictions, and compromise a user's system.
1) Multiple unspecified errors can be exploited to corrupt memory.
2) A use-after-free error exists within the XPConnect hashtable when handling IDBKeyRange indexedDB.
3) An error within the gfxImageSurface class when handling certain graphic values can be exploited to cause a heap-based buffer overflow.
4) An error when handling multi-octet encoding can be exploited to conduct cross-site scripting attacks.
5) An error within the "cairo_dwrite_font_face()" function when rendering fonts can be exploited to corrupt memory.
6) An error within the "WebGL.drawElements()" function when handling certain template arguments can be exploited to disclose contents of arbitrary video memory.
7) An error within docshell when loading pages can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar and e.g. conduct cross-site scripting attacks.
8) An error within the handling of XMLHttpRequest and WebSocket while using an IPv6 address can be exploited to bypass the same-origin policy.
9) An error when decoding ISO-2022-KR and ISO-2022-CN character sets can be exploited to conduct cross-site scripting attacks.
10) An error exists within the "texImage2D()" function within WebGL when using JSVAL_TO_OBJECT.
11) An off-by-one error exists within the OpenType sanitizer when parsing certain data.
13) An error when handling RSS and Atom XML content loaded over HTTPS can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar.
Successful exploitation of vulnerabilities #1, #2, #3, #5, #10, and #11 may allow execution of arbitrary code.
Upgrade to Firefox version 12.0 and Thunderbird version 12.0
v12.0 bump request
Old bug, closing as fixed cause we have 17.0.* in tree