[ALSA-2023:1802] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2023-04-20
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.10.0. Security Fix(es): * Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2023-28427) * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp (BZ#2186102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-102.10.0-2.el8_7.alma.aarch64.rpm d491f51588b6090093ab026b6e5575eaaab8edbf313aecee7c6d323658b909a3
ppc64le thunderbird-102.10.0-2.el8_7.alma.ppc64le.rpm 3cb972db83bdca995441ce8860cf6d1918021df96b116e9354cb0090d6321dd4
s390x thunderbird-102.10.0-2.el8_7.alma.s390x.rpm 35010ca2304b60cf4c3fdfcf32bf57cb42f702dc3032afcfd39f4ca8111c05b3
x86_64 thunderbird-102.10.0-2.el8_7.alma.x86_64.rpm 42621c5908046b1486aeac0da5ba757fff7d3b01bdb0ecb0e6a9edb703d90113
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.