8e5843b066
https://www.thunderbird.net/en-US/thunderbird/115.12.0/releasenotes MFSA 2024-28 (bsc#1226027) * CVE-2024-5702 (bmo#1193389) Use-after-free in networking * CVE-2024-5688 (bmo#1895086) Use-after-free in JavaScript object transplant * CVE-2024-5690 (bmo#1883693) External protocol handlers leaked by timing attack * CVE-2024-5691 (bmo#1888695) Sandboxed iframes were able to bypass sandbox restrictions to open a new window * CVE-2024-5692 (bmo#1891234) Bypass of file name restrictions during saving * CVE-2024-5693 (bmo#1891319) Cross-Origin Image leak via Offscreen Canvas * CVE-2024-5696 (bmo#1896555) Memory Corruption in Text Fragments * CVE-2024-5700 (bmo#1862809, bmo#1889355, bmo#1893388, bmo#1895123) Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=761
17 lines
833 B
Plaintext
17 lines
833 B
Plaintext
-----BEGIN PGP SIGNATURE-----
|
|
|
|
iQIzBAABCgAdFiEErdcHlHlwDcrf3VM34207E/PZMnQFAmZnbGQACgkQ4207E/PZ
|
|
MnRQ/xAAonYlpW3qI3HDR6fPQjU2EWgtnLQflyWXvEw2KAN/UeKa8mJ9Goa7aHG7
|
|
BjG1zrBJ/9v3FmV3cy5noebBkKTSHIvKKpKFuo0cM8kpODxMhxhTFV1BhlZg+dov
|
|
G/1V7w4n1mBu2jhfFizNhZFKhExpxD26u0a0CvHTruobU8mSxUs5ziap6m8Unodj
|
|
mRaWn6LC28AYiIWsFo+QgSufeFyurXEGlbY8uJfXiX57/AydgdC8UVrqpUja9t3S
|
|
o9jz53B0lFMwgJJGqDkPLsEoC3/OF5b+GcO5NZ2uYLof7awxwtkXI1ZyvVzatqpX
|
|
EfPFYe5OKTC8Ks492rGtLGs3OMzdBfW+eS8Ndq3XIuFaTIwijYg/VFZGpXz6soXH
|
|
QB5mDJOp9FR+aa5un55RMnv5yGGyZKGgPIFyV1A0xkyJ7PBkZSWgmhyj/p5U1xVM
|
|
WtDZnNTOcbb5F3MHStFZidUmbk8A0yZAOdjrzgVHeJpUNY+z+Od9TaKbkeuZTV1F
|
|
b5r3zX9fBppXQxxd39cKSDYvbuB35CT04e6tkYSfvsLGCnr8GF6h+n919gixD1Xw
|
|
Mu3TYObIZAakZQo04IA/2uTeuwqJKtFVUhhwvhllA/zKSdSVEwVP0/eh1GkX+/fC
|
|
OCvF5X8cZN1fkgTkHETvXnbcuc56FtWOZcRTEbcn5Rvo65d+t5o=
|
|
=vxBf
|
|
-----END PGP SIGNATURE-----
|