thunderbird 1:91.10.0-1 source package in Debian
Changelog
thunderbird (1:91.10.0-1) unstable; urgency=medium * [969960a] New upstream version 91.10.0 Fixed CVE issues in upstream version 91.9.1 (MFSA 2022-19): CVE-2022-1802: Prototype pollution in Top-Level Await implementation CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution Fixed CVE issues in upstream version 91.10 (MFSA 2022-22): CVE-2022-31736: Cross-Origin resource's length leaked CVE-2022-31737: Heap buffer overflow in WebGL CVE-2022-31738: Browser window spoof using fullscreen mode CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files CVE-2022-31740: Register allocation problem in WASM on arm64 CVE-2022-31741: Uninitialized variable leads to invalid memory read CVE-2022-1834: Braille space character caused incorrect sender email to be shown for a digitally signed email CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information CVE-2022-31747: Memory safety bugs fixed in Thunderbird 91.10 * [4b55e16] d/control: Increase Standards-Version to 4.6.0 No further changes needed. -- Carsten Schoenert <email address hidden> Mon, 30 May 2022 19:36:06 +0200
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
thunderbird_91.10.0-1.dsc | 8.2 KiB | 8405185c97d96d8b853c85082f5bf45279c585f96a78964c6bd9c3ff291e24cb |
thunderbird_91.10.0.orig-thunderbird-l10n.tar.xz | 11.7 MiB | 2f28e9e768f97ae96d6e68f3920f0c47024938cdb392d12930335a4833d61701 |
thunderbird_91.10.0.orig.tar.xz | 408.1 MiB | a834599ed6581e6c88dc2545d1815d9aae1a094fa16be25d26e496ae9f7b4985 |
thunderbird_91.10.0-1.debian.tar.xz | 532.8 KiB | 91881080c3959bed693b41e76e51cd9ecf3f5369606b72a7da5071ce552796b5 |
No changes file available.