thunderbird 1:102.10.0-1 source package in Debian
Changelog
thunderbird (1:102.10.0-1) unstable; urgency=medium * [8afefce] New upstream version 102.10.0 Fixed CVE issues in upstream version 102.10 (MFSA 2023-15): CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass CVE-2023-29533: Fullscreen notification obscured CVE-2023-1999: Double-free in libwebp CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction CVE-2023-29536: Invalid free from JavaScript code CVE-2023-0547: Revocation status of S/Mime recipient certificates was not checked CVE-2023-29479: Hang when processing certain OpenPGP messages CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux CVE-2023-29542: Bypass of file download extension restrictions CVE-2023-1945: Memory Corruption in Safe Browsing Code CVE-2023-29548: Incorrect optimization result on ARM64 CVE-2023-29550: Memory safety bugs fixed in Thunderbird 102.10 -- Carsten Schoenert <email address hidden> Mon, 17 Apr 2023 21:32:45 +0200
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
thunderbird_102.10.0-1.dsc | 8.3 KiB | 330b52f0637f5cf68edaffe4945dbca1563dc8251f20aa667fe3bae299df0e3f |
thunderbird_102.10.0.orig-thunderbird-l10n.tar.xz | 12.0 MiB | 62ba598b795a0ae9d96b0f627a6f862b60115f75a133e51c310085b5011e6e3d |
thunderbird_102.10.0.orig.tar.xz | 499.4 MiB | 52f4191b34eaa20b9c24d035895b8ca85812d52981096d6fe8efc5f794754c06 |
thunderbird_102.10.0-1.debian.tar.xz | 534.5 KiB | a8a6236b49de6de80187a590a2affe6dd221df3ba6a2008b7f3c1165f861f579 |
No changes file available.