THUNDERBIRD EMAIL PROBLEMS HOW TO
GNU Emacs and the associated Gnus come with extensive internal documentation, no web searches required to learn how to configure and use. I am so glad I made the switch, it did require the effort to learn, but indeed well worth it. Such an environment hilights the amount of inefficient time wasting addictive garbage the likes of Apple and Microsoft have pushed (yes “push” as in the drug pusher context) onto the naive public over the recent generations. Such liberation allows for unfettered rapid processing of the huge amount of mailing list email I receive each day, and as I am familiar with Emacs, writing messages are a lot less burdensome as well. No requirement for a graphical user interface (GUI) if desired, and indeed the mouse becomes redundant. I run Gnus via GNU Emacs and what a breath of fresh air it is to use. As such, I’ve made the effort to learn, to a working level, how to configure and run Gnus. It’s bad enough having to do it for Firefox without having to repeat the process for Thunderbox. No, I don’t use Thunderbird – although I did for most of my IT life until recently.įrankly, I’m sick to morbidity with dealing with Mozilla’s undocumented preferences (about:config) system. Now You: do you use Thunderbird? What would you like to see supported? CVE-2022-22751: Memory safety bugs fixed in Thunderbird 91.5.CVE-2022-22739: Missing throttling on external protocol launch dialog.CVE-2022-22747: Crash when handling empty pkcs7 sequence.CVE-2022-22744: The 'Copy as curl' feature in DevTools did not fully escape website-controlled data, potentially leading to command injection.CVE-2022-22745: Leaking cross-origin URLs through securitypolicyviolation event.CVE-2022-22748: Spoofed origin on external protocol launch dialog.CVE-2021-4140: Iframe sandbox bypass with XSLT.CVE-2022-22737: Race condition when playing audio files.CVE-2022-22738: Heap-buffer-overflow in blendGaussianBlur.CVE-2022-22740: Use-after-free of ChannelEventQueue::mOwner.CVE-2022-22741: Browser window spoof using fullscreen mode.CVE-2022-22742: Out-of-bounds memory access when inserting text in edit mode.CVE-2022-22743: Browser window spoof using fullscreen mode.CVE-2022-22746: Calling into reportValidity could have lead to fullscreen window spoof.