Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in thunderbird
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in thunderbird
ID: RHSA-2024:0027
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux Client (v. 7), Red Hat Enterprise Linux Server Optional (v. 7), Red Hat Enterprise Linux Workstation (v. 7)
Datum: Di, 2. Januar 2024, 18:53
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2255364
https://access.redhat.com/security/cve/CVE-2023-6857
https://bugzilla.redhat.com/show_bug.cgi?id=2255379
https://access.redhat.com/security/cve/CVE-2023-6863
https://bugzilla.redhat.com/show_bug.cgi?id=2255367
https://access.redhat.com/security/cve/CVE-2023-6864
https://bugzilla.redhat.com/show_bug.cgi?id=2255363
https://bugzilla.redhat.com/show_bug.cgi?id=2255378
https://bugzilla.redhat.com/show_bug.cgi?id=2255365
https://access.redhat.com/security/cve/CVE-2023-50761
https://access.redhat.com/security/cve/CVE-2023-6862
https://access.redhat.com/security/cve/CVE-2023-6861
https://access.redhat.com/security/cve/CVE-2023-6860
https://bugzilla.redhat.com/show_bug.cgi?id=2255360
https://access.redhat.com/security/cve/CVE-2023-50762
https://bugzilla.redhat.com/show_bug.cgi?id=2255368
https://access.redhat.com/security/cve/CVE-2023-6856
https://bugzilla.redhat.com/show_bug.cgi?id=2255370
https://access.redhat.com/security/cve/CVE-2023-6859
https://bugzilla.redhat.com/show_bug.cgi?id=2255369
https://access.redhat.com/errata/RHSA-2024:0027
https://access.redhat.com/security/cve/CVE-2023-6858
https://bugzilla.redhat.com/show_bug.cgi?id=2255362
Applikationen: Mozilla Thunderbird

Originalnachricht

An update for thunderbird is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.6.0.

Security Fix(es):

* Mozilla: Heap-buffer-overflow affecting WebGL
<code>DrawElementsInstanced</code> method with Mesa VM driver (CVE-2023-6856)

* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and
Thunderbird 115.6 (CVE-2023-6864)

* Mozilla: S/MIME signature accepted despite mismatching message date
(CVE-2023-50761)

* Mozilla: Truncated signed text was shown with a valid OpenPGP signature
(CVE-2023-50762)

* Mozilla: Symlinks may resolve to smaller than expected buffers
(CVE-2023-6857)

* Mozilla: Heap buffer overflow in <code>nsTextFragment</code>
(CVE-2023-6858)

* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)

* Mozilla: Potential sandbox escape due to <code>VideoBridge</code>
lack of texture validation (CVE-2023-6860)

* Mozilla: Heap buffer overflow affected
<code>nsWindow::PickerOpen(void)</code> in headless mode (CVE-2023-6861)

* Mozilla: Use-after-free in <code>nsDNSService</code>
(CVE-2023-6862)

* Mozilla: Undefined behavior in <code>ShutdownObserver()</code>
(CVE-2023-6863)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-6856: Heap-based Buffer Overflow (CWE-122)
CVE-2023-6857: Race Condition Enabling Link Following (CWE-363)
CVE-2023-6858: Heap-based Buffer Overflow (CWE-122)
CVE-2023-6859: Use After Free (CWE-416)
CVE-2023-6860: Improper Input Validation (CWE-20)
CVE-2023-6861: Heap-based Buffer Overflow (CWE-122)
CVE-2023-6862: Use After Free (CWE-416)
CVE-2023-6863: Improper Input Validation (CWE-20)
CVE-2023-6864: Buffer Copy without Checking Size of Input ('Classic Buffer
Overflow') (CWE-120)
CVE-2023-50761: Improper Verification of Cryptographic Signature (CWE-347)
CVE-2023-50762: Improper Verification of Cryptographic Signature (CWE-347)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung