thunderbird 1:102.0.1-1 source package in Debian
Changelog
thunderbird (1:102.0.1-1) unstable; urgency=medium * [68c9410] d/gbp.conf: Adjust upstream branch to new ESR cycle * [45eca79] New upstream version 102.0.1 Fixed CVE issues in upstream version 102.0 (MFSA 2022-26): CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content CVE-2022-34470: Use-after-free in nsSHistory CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI CVE-2022-2226: An email with a mismatching OpenPGP signature date was accepted as valid CVE-2022-34481: Potential integer overflow in ReplaceElementsAt CVE-2022-31744: CSP bypass enabling stylesheet injection CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked CVE-2022-2200: Undesired attributes could be set as part of prototype pollution CVE-2022-34484: Memory safety bugs fixed in Thunderbird 91.11 and Thunderbird 102 * [1842425] d/watch: Look now for versions starting with 3 digits * [0a32bb3] d/control: Add package thunderbird-l10n-es-mx -- Carsten Schoenert <email address hidden> Fri, 08 Jul 2022 17:47:21 +0200
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
thunderbird_102.0.1-1.dsc | 8.3 KiB | df1ad17963030df8c0e0295285ef76f4551dd178cf9b4baa1da73a2bd601cdb8 |
thunderbird_102.0.1.orig-thunderbird-l10n.tar.xz | 11.6 MiB | a46d5f61d0d32943a6e65433deed2fbf4620dcf5b425b0a74707447bf464fba1 |
thunderbird_102.0.1.orig.tar.xz | 503.0 MiB | 71e190d42da83a15a2cdf8fbab03c9a4637c45ba0a5a315197508324eab1f9c8 |
thunderbird_102.0.1-1.debian.tar.xz | 530.7 KiB | 213697cc1f437e7062e1d626814aef462a71d7f776258bea27d820b0b86fc755 |
No changes file available.