[ALSA-2024:0001] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2024-01-03
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.6.0. Security Fix(es): * Mozilla: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761) * Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in nsTextFragment (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to VideoBridge lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in nsDNSService (CVE-2023-6862) * Mozilla: Undefined behavior in ShutdownObserver() (CVE-2023-6863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-115.6.0-1.el9_3.alma.aarch64.rpm a50d290eedeb8747e153efe4dbe8ed0b5bf604c908f40a91761ef47a09708354
ppc64le thunderbird-115.6.0-1.el9_3.alma.ppc64le.rpm 6975f1d22e72f11ac459f1fa1f2706e67b0862fd812b4b56a58c12783de4e7e4
s390x thunderbird-115.6.0-1.el9_3.alma.s390x.rpm e5cc9d50f0d3a997a88461ab422eff1f8a6b606237de698c08fca6b1bcebed9b
x86_64 thunderbird-115.6.0-1.el9_3.alma.x86_64.rpm 2db5559c11bd68ec549bc96385ea9681632b3c20c876faf9c0ef9499e5f64d6f
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.