RLSA-2023:3221

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:3221.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:3221
Related
  • CVE-2023-32205
  • CVE-2023-32206
  • CVE-2023-32207
  • CVE-2023-32211
  • CVE-2023-32212
  • CVE-2023-32213
  • CVE-2023-32215
Published
2023-05-18T19:52:18.288616Z
Modified
2023-05-18T19:53:57.490405Z
Summary
Important: thunderbird security update
Details

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 102.11.0.

Security Fix(es):

  • Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205)

  • Mozilla: Crash in RLBox Expat driver (CVE-2023-32206)

  • Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207)

  • Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215)

  • Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211)

  • Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212)

  • Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:102.11.0-1.el8_7