HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the <code>about:pocket-saved</code> (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. External Reference: https://www.mozilla.org/security/announce/2016/mfsa2016-95/#CVE-2016-9901 Acknowledgements: Name: the Mozilla project Upstream: Wladimir Palant
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:2946 https://rhn.redhat.com/errata/RHSA-2016-2946.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:2973 https://rhn.redhat.com/errata/RHSA-2016-2973.html