[ALSA-2023:1809] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2023-04-20
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.10.0. Security Fix(es): * Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2023-28427) * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp (BZ#2186102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-102.10.0-2.el9_1.alma.aarch64.rpm b5c04be2713b19f5cda36ba68007af8f5b7bfba51cb62bc7c1961b81473d1040
ppc64le thunderbird-102.10.0-2.el9_1.alma.ppc64le.rpm 7b0c35b19cf7ba9a5253085fed0dede18ae8411b3e7900ccc1642d2af5d7c0b4
s390x thunderbird-102.10.0-2.el9_1.alma.s390x.rpm e552f0c1d531aed452d02c5412d6cf2d78ca179bf4121b0ae1646dbab76195fa
x86_64 thunderbird-102.10.0-2.el9_1.alma.x86_64.rpm fcba53647419b8abd2bc5d83199f6aedc8b8a434c882f7e69bbe082216d0ff42
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.