forked from pool/MozillaThunderbird
ed5ea29202
https://www.thunderbird.net/en-US/thunderbird/91.5.0/releasenotes MFSA 2022-03 (bsc#1194547) * CVE-2022-22746 (bmo#1735071) Calling into reportValidity could have lead to fullscreen window spoof * CVE-2022-22743 (bmo#1739220) Browser window spoof using fullscreen mode * CVE-2022-22742 (bmo#1739923) Out-of-bounds memory access when inserting text in edit mode * CVE-2022-22741 (bmo#1740389) Browser window spoof using fullscreen mode * CVE-2022-22740 (bmo#1742334) Use-after-free of ChannelEventQueue::mOwner * CVE-2022-22738 (bmo#1742382) Heap-buffer-overflow in blendGaussianBlur * CVE-2022-22737 (bmo#1745874) Race condition when playing audio files * CVE-2021-4140 (bmo#1746720) Iframe sandbox bypass with XSLT * CVE-2022-22748 (bmo#1705211) Spoofed origin on external protocol launch dialog * CVE-2022-22745 (bmo#1735856) Leaking cross-origin URLs through securitypolicyviolation event * CVE-2022-22744 (bmo#1737252) The 'Copy as curl' feature in DevTools did not fully escape website-controlled data, potentially leading to command injection * CVE-2022-22747 (bmo#1735028) Crash when handling empty pkcs7 sequence * CVE-2022-22739 (bmo#1744158) OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=620
11 lines
339 B
Plaintext
11 lines
339 B
Plaintext
PRODUCT="thunderbird"
|
|
CHANNEL="esr91"
|
|
VERSION="91.5.0"
|
|
VERSION_SUFFIX=""
|
|
PREV_VERSION="91.4.1"
|
|
PREV_VERSION_SUFFIX=""
|
|
#SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation
|
|
RELEASE_REPO="https://hg.mozilla.org/releases/comm-esr91"
|
|
RELEASE_TAG="bcd2aab51cd0889d506d29455210d65602b97430"
|
|
RELEASE_TIMESTAMP="20220106182030"
|