[ALSA-2023:0824] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2023-02-21
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-102.8.0-2.el9_1.alma.aarch64.rpm c821dc0425f02be30ad4d2bdb2b00b556d7748c0ea24d7bf0483a6ad21242bf9
ppc64le thunderbird-102.8.0-2.el9_1.alma.ppc64le.rpm 164ca7e8b8c1e1f9bdf5d4257df3833a64ad58af36257dfdac766d313c5c00b7
s390x thunderbird-102.8.0-2.el9_1.alma.s390x.rpm 3e49afef8c2487222e2103fffd36d18f76bd78be2ebd12015150d1f6c8ddb16f
x86_64 thunderbird-102.8.0-2.el9_1.alma.x86_64.rpm 61585e36c901cb932b94a3fe60382fd0dbab569af28a527f086721762ec217f5
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.