forked from pool/MozillaThunderbird
8e5843b066
https://www.thunderbird.net/en-US/thunderbird/115.12.0/releasenotes MFSA 2024-28 (bsc#1226027) * CVE-2024-5702 (bmo#1193389) Use-after-free in networking * CVE-2024-5688 (bmo#1895086) Use-after-free in JavaScript object transplant * CVE-2024-5690 (bmo#1883693) External protocol handlers leaked by timing attack * CVE-2024-5691 (bmo#1888695) Sandboxed iframes were able to bypass sandbox restrictions to open a new window * CVE-2024-5692 (bmo#1891234) Bypass of file name restrictions during saving * CVE-2024-5693 (bmo#1891319) Cross-Origin Image leak via Offscreen Canvas * CVE-2024-5696 (bmo#1896555) Memory Corruption in Text Fragments * CVE-2024-5700 (bmo#1862809, bmo#1889355, bmo#1893388, bmo#1895123) Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=761
11 lines
345 B
Plaintext
11 lines
345 B
Plaintext
PRODUCT="thunderbird"
|
|
CHANNEL="esr115"
|
|
VERSION="115.12.0"
|
|
VERSION_SUFFIX=""
|
|
PREV_VERSION="115.11.1"
|
|
PREV_VERSION_SUFFIX=""
|
|
#SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation
|
|
RELEASE_REPO="https://hg.mozilla.org/releases/comm-esr115"
|
|
RELEASE_TAG="c8e74fba9d207152648b517f30da7f391a514a1a"
|
|
RELEASE_TIMESTAMP="20240614163201"
|