drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in thunderbird
Name: |
Mehrere Probleme in thunderbird |
|
ID: |
RHSA-2024:0027 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux Client (v. 7), Red Hat Enterprise Linux Server Optional (v. 7), Red Hat Enterprise Linux Workstation (v. 7) |
|
Datum: |
Di, 2. Januar 2024, 18:53 |
|
Referenzen: |
https://bugzilla.redhat.com/show_bug.cgi?id=2255364
https://access.redhat.com/security/cve/CVE-2023-6857
https://bugzilla.redhat.com/show_bug.cgi?id=2255379
https://access.redhat.com/security/cve/CVE-2023-6863
https://bugzilla.redhat.com/show_bug.cgi?id=2255367
https://access.redhat.com/security/cve/CVE-2023-6864
https://bugzilla.redhat.com/show_bug.cgi?id=2255363
https://bugzilla.redhat.com/show_bug.cgi?id=2255378
https://bugzilla.redhat.com/show_bug.cgi?id=2255365
https://access.redhat.com/security/cve/CVE-2023-50761
https://access.redhat.com/security/cve/CVE-2023-6862
https://access.redhat.com/security/cve/CVE-2023-6861
https://access.redhat.com/security/cve/CVE-2023-6860
https://bugzilla.redhat.com/show_bug.cgi?id=2255360
https://access.redhat.com/security/cve/CVE-2023-50762
https://bugzilla.redhat.com/show_bug.cgi?id=2255368
https://access.redhat.com/security/cve/CVE-2023-6856
https://bugzilla.redhat.com/show_bug.cgi?id=2255370
https://access.redhat.com/security/cve/CVE-2023-6859
https://bugzilla.redhat.com/show_bug.cgi?id=2255369
https://access.redhat.com/errata/RHSA-2024:0027
https://access.redhat.com/security/cve/CVE-2023-6858
https://bugzilla.redhat.com/show_bug.cgi?id=2255362 |
|
Applikationen: |
Mozilla Thunderbird |
|
Originalnachricht |
An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.6.0.
Security Fix(es):
* Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver (CVE-2023-6856)
* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)
* Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761)
* Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762)
* Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)
* Mozilla: Heap buffer overflow in <code>nsTextFragment</code> (CVE-2023-6858)
* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)
* Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation (CVE-2023-6860)
* Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode (CVE-2023-6861)
* Mozilla: Use-after-free in <code>nsDNSService</code> (CVE-2023-6862)
* Mozilla: Undefined behavior in <code>ShutdownObserver()</code> (CVE-2023-6863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2023-6856: Heap-based Buffer Overflow (CWE-122) CVE-2023-6857: Race Condition Enabling Link Following (CWE-363) CVE-2023-6858: Heap-based Buffer Overflow (CWE-122) CVE-2023-6859: Use After Free (CWE-416) CVE-2023-6860: Improper Input Validation (CWE-20) CVE-2023-6861: Heap-based Buffer Overflow (CWE-122) CVE-2023-6862: Use After Free (CWE-416) CVE-2023-6863: Improper Input Validation (CWE-20) CVE-2023-6864: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120) CVE-2023-50761: Improper Verification of Cryptographic Signature (CWE-347) CVE-2023-50762: Improper Verification of Cryptographic Signature (CWE-347)
|
|
|
|