[ALSA-2024:0003] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2024-01-04
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.6.0. Security Fix(es): * Mozilla: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761) * Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in nsTextFragment (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to VideoBridge lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in nsDNSService (CVE-2023-6862) * Mozilla: Undefined behavior in ShutdownObserver() (CVE-2023-6863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-115.6.0-1.el8_9.alma.aarch64.rpm 52ab44e10c27cf308767a056b5fe1477a7df25ff7d1be0b6e91e9c8d840c9fb1
ppc64le thunderbird-115.6.0-1.el8_9.alma.ppc64le.rpm 65b9379baf4371d9d248a7a7d3aced2859696aa1bd0062c12d9c342b3d93f6b0
s390x thunderbird-115.6.0-1.el8_9.alma.s390x.rpm 945cbb209ae31ad5efd3c063ffa1ded75197f1a14aef568a1b9f973ba9d51d26
x86_64 thunderbird-115.6.0-1.el8_9.alma.x86_64.rpm 981deb0d5acab4983bf120938899261b5090e49c2ef02b289f2706f85696df89
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.