An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
thunderbird-0:102.8.0-2.el8_7.src.rpm
thunderbird-0:102.8.0-2.el8_7.aarch64.rpm
thunderbird-0:102.8.0-2.el8_7.x86_64.rpm
thunderbird-debuginfo-0:102.8.0-2.el8_7.aarch64.rpm
thunderbird-debuginfo-0:102.8.0-2.el8_7.x86_64.rpm
thunderbird-debugsource-0:102.8.0-2.el8_7.aarch64.rpm
thunderbird-debugsource-0:102.8.0-2.el8_7.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
https://bugzilla.redhat.com/show_bug.cgi?id=2170374
https://bugzilla.redhat.com/show_bug.cgi?id=2170375
https://bugzilla.redhat.com/show_bug.cgi?id=2170376
https://bugzilla.redhat.com/show_bug.cgi?id=2170377
https://bugzilla.redhat.com/show_bug.cgi?id=2170378
https://bugzilla.redhat.com/show_bug.cgi?id=2170379
https://bugzilla.redhat.com/show_bug.cgi?id=2170381
https://bugzilla.redhat.com/show_bug.cgi?id=2170382
https://bugzilla.redhat.com/show_bug.cgi?id=2170383
https://bugzilla.redhat.com/show_bug.cgi?id=2170390
https://bugzilla.redhat.com/show_bug.cgi?id=2170391
https://bugzilla.redhat.com/show_bug.cgi?id=2170402
https://bugzilla.redhat.com/show_bug.cgi?id=2171397