Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.28787
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.28787
<patchinfo incident="28787"> <issue tracker="bnc" id="1210212">VUL-0: MozillaFirefox / MozillaThunderbird: update to 112 and 102.10esr</issue> <issue tracker="cve" id="2023-29550"/> <issue tracker="cve" id="2023-0547"/> <issue tracker="cve" id="2023-29532"/> <issue tracker="cve" id="2023-29531"/> <issue tracker="cve" id="2023-1999"/> <issue tracker="cve" id="2023-29535"/> <issue tracker="cve" id="2023-29539"/> <issue tracker="cve" id="2023-29541"/> <issue tracker="cve" id="2023-29545"/> <issue tracker="cve" id="2023-29536"/> <issue tracker="cve" id="2023-29479"/> <issue tracker="cve" id="2023-29542"/> <issue tracker="cve" id="2023-29533"/> <issue tracker="cve" id="2023-1945"/> <issue tracker="cve" id="2023-29548"/> <packager>MSirringhaus</packager> <rating>important</rating> <category>security</category> <summary>Security update for MozillaThunderbird</summary> <description>This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 102.10.1 (MFSA 2023-15) (bsc#1210212): Security fixes: * CVE-2023-29531: Out-of-bound memory access in WebGL on macOS (bmo#1794292) * CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass (bmo#1806394) * CVE-2023-29533: Fullscreen notification obscured (bmo#1798219, bmo#1814597) * CVE-2023-1999: Double-free in libwebp (bmo#1819244) * CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction (bmo#1820543) * CVE-2023-29536: Invalid free from JavaScript code (bmo#1821959) * CVE-2023-0547: Revocation status of S/Mime recipient certificates was not checked (bmo#1811298) * CVE-2023-29479: Hang when processing certain OpenPGP messages (bmo#1824978) * CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download (bmo#1784348) * CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux (bmo#1810191) * CVE-2023-29542: Bypass of file download extension restrictions (bmo#1810793, bmo#1815062) * CVE-2023-29545: Windows Save As dialog resolved environment variables (bmo#1823077) * CVE-2023-1945: Memory Corruption in Safe Browsing Code (bmo#1777588) * CVE-2023-29548: Incorrect optimization result on ARM64 (bmo#1822754) * CVE-2023-29550: Memory safety bugs fixed in Thunderbird 102.10 (bmo#1720594, bmo#1751945, bmo#1812498, bmo#1814217, bmo#1818357, bmo#1818762, bmo#1819493, bmo#1820389, bmo#1820602, bmo#1821448, bmo#1822413, bmo#1824828) Other fixes: * fixed: Messages with missing or corrupt "From:" header did not display message header buttons (bmo#1793918) * fixed: Composer repeatedly prompted for S/MIME smartcard signing/encryption password (bmo#1828366) * fixed: Address Book integration did not work with macOS 11.4 Bug Sur (bmo#1720257) * fixed: Mexico City DST fix in Thunderbird 102.10.0 (bug 1826146) was incomplete (bmo#1827503) * changed: New messages will automatically select S/MIME if configured and OpenPGP is not (bmo#1793278) * fixed: Calendar events with timezone America/Mexico_City incorrectly applied Daylight Savings Time (bmo#1826146) * fixed: Security fixes </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor