forked from pool/MozillaThunderbird
c53405a61a
MFSA 2024-23 (bsc#1224056) * CVE-2024-4367 (bmo#1893645) Arbitrary JavaScript execution in PDF.js * CVE-2024-4767 (bmo#1878577) IndexedDB files retained in private browsing mode * CVE-2024-4768 (bmo#1886082) Potential permissions request bypass via clickjacking * CVE-2024-4769 (bmo#1886108) Cross-origin responses could be distinguished between script and non-script content-types * CVE-2024-4770 (bmo#1893270) Use-after-free could occur when printing to PDF * CVE-2024-4777 (bmo#1878199, bmo#1893340) Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=757
17 lines
833 B
Plaintext
17 lines
833 B
Plaintext
-----BEGIN PGP SIGNATURE-----
|
|
|
|
iQIzBAABCgAdFiEErdcHlHlwDcrf3VM34207E/PZMnQFAmZCLiEACgkQ4207E/PZ
|
|
MnR7rg//dNqR7dE3GP8EZhECXyuW6yn+qMReH6C1kNAOQIPSx8YAjQ+So/MJAayp
|
|
9b4Mku/AFgGawfCFpb0u6sXQQEOKb0pJBBY11VgKYy7wYnMAHoL7N1V9deCRzq4K
|
|
08pXty2WcVYJe+mVjMtGoRaVvPxe3Hf/Bl8PC620Z/DJeFdpmpo5EqMP1tK7x1kD
|
|
nXRPROPcRYVPOjc2DsC5Tgr4X7idws0Zzdw/BvfxZ6y+LG1peB6WHB+5uZkFO9Yd
|
|
D182H+vzjZ878dMDQM3zbbt3Ic9bt/J/w6/FBOrTI0L+a5jZM25jRR+B8UL6JnXs
|
|
zUzNrRMe82R2QyzDX1LGXJKuC5K5mQbFOLiwoLxNILixBoceHAyaj6pQn6v2wdLA
|
|
lT+G4hW9wdIA3nBcvN7R7P3m+kYXtUXWhA24NQDP3uclbsbuzyqnJqRRNEXjMQDJ
|
|
NglYcG9BTmt8FOIp4naiBoPACBggZ5giU2wq1rQSyW3jf6TwQ+ADBpHVUeVHHWLp
|
|
Zn0lUtQe9tN0MbvKN4cFkq7u5KuckbfCsYZ8pimELEAOIzTWzCAtBy3lBy2aP4vr
|
|
MHALKUgBBvxS7bc+0vMm34nUjthVg5l711XNPeQsy1mNK38pEo2wYyebdQh56roW
|
|
1E/S/CcPwih4yxAf42SDYQrsQPe6nEbOhCHeMn8cJnDguYI9P9g=
|
|
=z7Es
|
|
-----END PGP SIGNATURE-----
|