forked from pool/MozillaThunderbird
55bb2ec82a
https://www.thunderbird.net/en-US/thunderbird/115.5.0/releasenotes MFSA 2023-52 (bsc#) * CVE-2023-6204 (bmo#1841050) Out-of-bound memory access in WebGL2 blitFramebuffer * CVE-2023-6205 (bmo#1854076) Use-after-free in MessagePort::Entangled * CVE-2023-6206 (bmo#1857430) Clickjacking permission prompts using the fullscreen transition * CVE-2023-6207 (bmo#1861344) Use-after-free in ReadableByteStreamQueueEntry::Buffer * CVE-2023-6208 (bmo#1855345) Using Selection API would copy contents into X11 primary selection. * CVE-2023-6209 (bmo#1858570) Incorrect parsing of relative URLs starting with "///" * CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252, bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943, bmo#1862782) Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=734
17 lines
833 B
Plaintext
17 lines
833 B
Plaintext
-----BEGIN PGP SIGNATURE-----
|
|
|
|
iQIzBAABCgAdFiEErdcHlHlwDcrf3VM34207E/PZMnQFAmVb/5wACgkQ4207E/PZ
|
|
MnTUvw//ZWCoLQAdW7dD5H6tKQuLzf3Y75Uktuvbp9SMdbZak7A1kL/WzJ5vHc+d
|
|
vrZmOU2r2XJFRq+MFWCWSx4idxfNZrRX+Vxyhx+SBbDDmwewaCmTwQrauE/ENU2S
|
|
d8EJinkTYKxPMn3i/E+erN5n/5eKGXhV6vNTOtQHXwttIRqyYBqhRoyiD18Fx0Xh
|
|
zwFGgc2+R5ohlyKOvbeaM6M6FLBtDtwsgoOF8rDHc+pMavA4lrgmeVp6bgZrs22D
|
|
rOjSdZjVx80zc4qmqpiQwXtBL4Pf1VXchLs/AoS9PK6A1OOWehD/js5vYEQv9PwX
|
|
IGqlf1C73pgdmqww52Wa48VM/mNw4rrBDYdS7PhmMqHZG6SyqtdfXG8A9pf0C8l6
|
|
iYulJTq2ffK4wJQfO6Yobbsk3z5WeMZYWPQ/vAiumQJNlCHI79iTKOjsMm7mk/TB
|
|
VWYAWVuYjGzg6BbvUO+a3Yp6Z7fkswijZRllLc3qshhcqoA2/z+qkPHGBOL2GXvC
|
|
KOItJVs14PlZi1JZwmsnqnTM1VLh+fhpjsW2icDelxOe0o3mBrCoxgAQf+wlnNdL
|
|
s/PYAFL86mlX9pGSMsEjF8labZ84TsHSq/VODhB5XqFQO3bzU/cz+Lm18FBIFvdb
|
|
lfRSIWhcK13+zShmw0exUYi0ad7pPTGOm+H6yVq48hQ1y1y+4k4=
|
|
=oyj5
|
|
-----END PGP SIGNATURE-----
|