Synopsis:          Important: thunderbird security update
Advisory ID:       SLSA-2023:4495-1
Issue Date:        2023-08-07
CVE Numbers:       CVE-2023-4045
                   CVE-2023-4046
                   CVE-2023-4047
                   CVE-2023-4048
                   CVE-2023-4049
                   CVE-2023-4050
                   CVE-2023-4055
                   CVE-2023-4056
                   CVE-2023-4057
                   CVE-2023-3417
--

This update upgrades Thunderbird to version 102.14.0.

Security Fix(es):

* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions
(CVE-2023-4045)

* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)

* Mozilla: Potential permissions request bypass via clickjacking
(CVE-2023-4047)

* Mozilla: Crash in DOMParser due to out-of-memory conditions
(CVE-2023-4048)

* Mozilla: Fix potential race conditions when releasing platform objects
(CVE-2023-4049)

* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)

* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1,
Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14
(CVE-2023-4056)

* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird
115.1 (CVE-2023-4057)

* thunderbird: File Extension Spoofing using the Text Direction Override
Character (CVE-2023-3417)

* Mozilla: Cookie jar overflow caused unexpected cookie jar state
(CVE-2023-4055)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

SL7
  x86_64
    thunderbird-102.14.0-1.el7_9.x86_64.rpm
    thunderbird-debuginfo-102.14.0-1.el7_9.x86_64.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2023-4495-1 Important: thunderbird on SL7.x x86_64

This update upgrades Thunderbird to version 102.14.0

Summary

Important: thunderbird security update



Security Fixes

* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
* thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE
SL7 x86_64 thunderbird-102.14.0-1.el7_9.x86_64.rpm thunderbird-debuginfo-102.14.0-1.el7_9.x86_64.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2023:4495-1
Issued Date: : 2023-08-07
CVE Numbers: CVE-2023-4045
CVE-2023-4046
CVE-2023-4047

Related News