Пакет thunderbird-wayland: Информация
Бинарный пакет: thunderbird-wayland
Версия: 91.6.0-alt1
Архитектура: ppc64le
Собран: 17 февраля 2022 г. 12:17 в задании #295262
Исходный пакет: thunderbird
Категория: Сети/Почта
Сообщить об ошибке в пакетеДомашняя страница: https://www.thunderbird.net
Лицензия: MPL-2.0
О пакете: Thunderbird Wayland launcher
Описание:
The thunderbird-wayland package contains launcher and desktop file to run Thunderbird natively on Wayland.
Сопровождающий: Andrey Cherepanov
Список участников:
Pavel Vasenkov
Andrey Cherepanov
Aleksei Nikiforov
Gleb Fotengauer-Malinovskiy
Paul Wolneykien
Anton Farygin
Vladimir Didenko
Alexey Gladkov
Alexey Morozov
Pavel Vasenkov
Andrey Cherepanov
Aleksei Nikiforov
Gleb Fotengauer-Malinovskiy
Paul Wolneykien
Anton Farygin
Vladimir Didenko
Alexey Gladkov
Alexey Morozov
Последнее изменение
12 февраля 2022 г. Pavel Vasenkov 91.6.0-alt1
- New version. - Security fixes: + CVE-2022-22753 Privilege Escalation to SYSTEM on Windows via Maintenance Service + CVE-2022-22754 Extensions could have bypassed permission confirmation during update + CVE-2022-22756 Drag and dropping an image could have resulted in the dropped object being an executable + CVE-2022-22759 Sandboxed iframes could have executed script if the parent appended elements + CVE-2022-22760 Cross-Origin responses could be distinguished between script and non-script content-types + CVE-2022-22761 frame-ancestors Content Security Policy directive was not enforced for framed extension pages + CVE-2022-22763 Script Execution during invalid object state + CVE-2022-22764 Memory safety bugs fixed in Thunderbird 91.6
25 января 2022 г. Pavel Vasenkov 91.5.1-alt1
- New version.
12 января 2022 г. Andrey Cherepanov 91.5.0-alt1
- New version. - Security fixes: + CVE-2022-22746 Calling into reportValidity could have lead to fullscreen window spoof + CVE-2022-22743 Browser window spoof using fullscreen mode + CVE-2022-22742 Out-of-bounds memory access when inserting text in edit mode + CVE-2022-22741 Browser window spoof using fullscreen mode + CVE-2022-22740 Use-after-free of ChannelEventQueue::mOwner + CVE-2022-22738 Heap-buffer-overflow in blendGaussianBlur + CVE-2022-22737 Race condition when playing audio files + CVE-2021-4140 Iframe sandbox bypass with XSLT + CVE-2022-22748 Spoofed origin on external protocol launch dialog + CVE-2022-22745 Leaking cross-origin URLs through securitypolicyviolation event + CVE-2022-22744 The 'Copy as curl' feature in DevTools did not fully escape website-controlled data, potentially leading to command injection + CVE-2022-22747 Crash when handling empty pkcs7 sequence + CVE-2022-22739 Missing throttling on external protocol launch dialog + CVE-2022-22751 Memory safety bugs fixed in Thunderbird 91.5