File _patchinfo of Package patchinfo.28787
<patchinfo incident="28787">
<issue tracker="bnc" id="1210212">VUL-0: MozillaFirefox / MozillaThunderbird: update to 112 and 102.10esr</issue>
<issue tracker="cve" id="2023-29550"/>
<issue tracker="cve" id="2023-0547"/>
<issue tracker="cve" id="2023-29532"/>
<issue tracker="cve" id="2023-29531"/>
<issue tracker="cve" id="2023-1999"/>
<issue tracker="cve" id="2023-29535"/>
<issue tracker="cve" id="2023-29539"/>
<issue tracker="cve" id="2023-29541"/>
<issue tracker="cve" id="2023-29545"/>
<issue tracker="cve" id="2023-29536"/>
<issue tracker="cve" id="2023-29479"/>
<issue tracker="cve" id="2023-29542"/>
<issue tracker="cve" id="2023-29533"/>
<issue tracker="cve" id="2023-1945"/>
<issue tracker="cve" id="2023-29548"/>
<packager>MSirringhaus</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for MozillaThunderbird</summary>
<description>This update for MozillaThunderbird fixes the following issues:
Update to Mozilla Thunderbird 102.10.1 (MFSA 2023-15) (bsc#1210212):
Security fixes:
* CVE-2023-29531: Out-of-bound memory access in WebGL on macOS (bmo#1794292)
* CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass (bmo#1806394)
* CVE-2023-29533: Fullscreen notification obscured (bmo#1798219, bmo#1814597)
* CVE-2023-1999: Double-free in libwebp (bmo#1819244)
* CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction (bmo#1820543)
* CVE-2023-29536: Invalid free from JavaScript code (bmo#1821959)
* CVE-2023-0547: Revocation status of S/Mime recipient certificates was not checked (bmo#1811298)
* CVE-2023-29479: Hang when processing certain OpenPGP messages (bmo#1824978)
* CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download (bmo#1784348)
* CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux (bmo#1810191)
* CVE-2023-29542: Bypass of file download extension restrictions (bmo#1810793, bmo#1815062)
* CVE-2023-29545: Windows Save As dialog resolved environment variables (bmo#1823077)
* CVE-2023-1945: Memory Corruption in Safe Browsing Code (bmo#1777588)
* CVE-2023-29548: Incorrect optimization result on ARM64 (bmo#1822754)
* CVE-2023-29550: Memory safety bugs fixed in Thunderbird 102.10 (bmo#1720594, bmo#1751945, bmo#1812498,
bmo#1814217, bmo#1818357, bmo#1818762, bmo#1819493,
bmo#1820389, bmo#1820602, bmo#1821448, bmo#1822413,
bmo#1824828)
Other fixes:
* fixed: Messages with missing or corrupt "From:" header did not display message header buttons (bmo#1793918)
* fixed: Composer repeatedly prompted for S/MIME smartcard signing/encryption password (bmo#1828366)
* fixed: Address Book integration did not work with macOS 11.4 Bug Sur (bmo#1720257)
* fixed: Mexico City DST fix in Thunderbird 102.10.0 (bug 1826146) was incomplete (bmo#1827503)
* changed: New messages will automatically select S/MIME if configured and OpenPGP is not (bmo#1793278)
* fixed: Calendar events with timezone America/Mexico_City incorrectly applied Daylight Savings Time (bmo#1826146)
* fixed: Security fixes
</description>
</patchinfo>