thunderbird-102.14.0-1.el9.ML.1
エラータID: AXSA:2023-6344:22
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.14.0.
Security Fix(es):
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions
(CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking
(CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects
(CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox
ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird
115.1 (CVE-2023-4057)
* thunderbird: File Extension Spoofing using the Text Direction Override
Character (CVE-2023-3417)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state
(CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2023-3417
Thunderbird allowed the Text Direction Override Unicode Character in filenames.
An email attachment could be incorrectly shown as being a document file, while
in fact it was an executable file. Newer versions of Thunderbird will strip the
character and show the correct file extension. This vulnerability affects
Thunderbird < 115.0.1 and Thunderbird < 102.13.1.
CVE-2023-4045
Offscreen Canvas did not properly track cross-origin tainting, which could have
been used to access image data from another site in violation of same-origin
policy. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and
Firefox ESR < 115.1.
CVE-2023-4046
In some circumstances, a stale value could have been used for a global variable
in WASM JIT analysis. This resulted in incorrect compilation and a potentially
exploitable crash in the content process. This vulnerability affects Firefox <
116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
CVE-2023-4047
A bug in popup notifications delay calculation could have made it possible for
an attacker to trick a user into granting permissions. This vulnerability
affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
CVE-2023-4048
An out-of-bounds read could have led to an exploitable crash when parsing HTML
with DOMParser in low memory situations. This vulnerability affects Firefox <
116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
CVE-2023-4049
Race conditions in reference counting code were found through code inspection.
These could have resulted in potentially exploitable use-after-free
vulnerabilities. This vulnerability affects Firefox < 116, Firefox ESR < 102.14,
and Firefox ESR < 115.1.
CVE-2023-4050
In some cases, an untrusted input stream was copied to a stack buffer without
checking its size. This resulted in a potentially exploitable crash which could
have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox
ESR < 102.14, and Firefox ESR < 115.1.
CVE-2023-4055
When the number of cookies per domain was exceeded in `document.cookie`, the
actual cookie jar sent to the host was no longer consistent with expected cookie
jar state. This could have caused requests to be sent with some cookies missing.
This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR
< 115.1.
CVE-2023-4056
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR
102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed
evidence of memory corruption and we presume that with enough effort some of
these could have been exploited to run arbitrary code. This vulnerability
affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
CVE-2023-4057
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and Thunderbird
115.0. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run arbitrary
code. This vulnerability affects Firefox < 116, Firefox ESR < 115.1, and
Thunderbird < 115.1.
Update packages.
Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1 and Thunderbird < 102.13.1.
Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
When the number of cookies per domain was exceeded in `document.cookie`, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. This could have caused requests to be sent with some cookies missing. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and Thunderbird 115.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116, Firefox ESR < 115.1, and Thunderbird < 115.1.
N/A
SRPMS
- thunderbird-102.14.0-1.el9.ML.1.src.rpm
MD5: 0e8dbc0969d3b6cc61162e272781c77b
SHA-256: 793fa8eaa2a0c43eb5575f673144029d649eed197a2941de673a5c3f3ba418a0
Size: 616.96 MB
Asianux Server 9 for x86_64
- thunderbird-102.14.0-1.el9.ML.1.x86_64.rpm
MD5: 4425e35e687f37c9b7c4432c12feb6a7
SHA-256: e4f874b41682305535449eaf2bf4945dd8c71d02c9cbff073ba4e0162ce621bd
Size: 102.52 MB