Mageia 2023-0343: thunderbird security update
Summary
The updated packages fix security vulnerabilities.
Out-of-bound memory access in WebGL2 blitFramebuffer. (CVE-2023-6204)
Use-after-free in MessagePort::Entangled. (CVE-2023-6205)
Clickjacking permission prompts using the fullscreen transition.
(CVE-2023-6206)
Use-after-free in ReadableByteStreamQueueEntry::Buffer. (CVE-2023-6207)
Using Selection API would copy contents into X11 primary selection.
(CVE-2023-6208)
Incorrect parsing of relative URLs starting with "///". (CVE-2023-6209)
Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. (CVE-2023-6212)
References
- https://bugs.mageia.org/show_bug.cgi?id=32552
- https://www.thunderbird.net/en-US/thunderbird/115.5.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/115.5.1/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
Resolution
MGASA-2023-0343 - Updated thunderbird packages fix security vulnerabilities
SRPMS
- 9/core/thunderbird-115.5.1-1.mga9
- 9/core/thunderbird-l10n-115.5.1-1.mga9