First published: Tue May 16 2023(Updated: )
Mozilla Thunderbird is a standalone mail and newsgroup client.<br>This update upgrades Thunderbird to version 102.11.0.<br>Security Fix(es):<br><li> Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205)</li> <li> Mozilla: Crash in RLBox Expat driver (CVE-2023-32206)</li> <li> Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207)</li> <li> Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215)</li> <li> Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211)</li> <li> Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212)</li> <li> Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
redhat/thunderbird | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
redhat/thunderbird-debuginfo | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
redhat/thunderbird-debugsource | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
redhat/thunderbird | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
redhat/thunderbird-debuginfo | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
redhat/thunderbird-debugsource | <102.11.0-1.el8_2 | 102.11.0-1.el8_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:3153 addresses issues including CVE-2023-32205, which involves browser prompts being obscured by popups, and a crash in the RLBox Expat driver.
The recommended version to upgrade to for RHSA-2023:3153 is Thunderbird 102.11.0.
To apply the fix for RHSA-2023:3153, upgrade the Thunderbird package to version 102.11.0-1.el8_2 using your package manager.
Users of Thunderbird before version 102.11.0-1.el8_2 are potentially affected by the vulnerabilities addressed in RHSA-2023:3153.
If you cannot upgrade to the recommended version for RHSA-2023:3153, it is advised to apply available security mitigations and monitor for further updates.