QID 257268
Date Published: 2023-12-06
QID 257268: Centos Security Update for thunderbird
Mozilla thunderbird is a standalone mail and newsgroup client...Security Fix(es):
- mozilla: offscreen canvas could have bypassed cross-origin restrictions (cve-2023-4045).
Mozilla: incorrect value used during wasm compilation (cve-2023-4046).
Mozilla: potential permissions request bypass via clickjacking (cve-2023-4047).
Mozilla: crash in domparser due to out-of-memory conditions (cve-2023-4048).
Mozilla: fix potential race conditions when releasing platform objects (cve-2023-4049).
Mozilla: stack buffer overflow in storagemanager (cve-2023-4050).
Mozilla: memory safety bugs fixed in firefox 116, firefox esr 115.1, firefox esr 102.14, thunderbird 115.1, and thunderbird 102.14 (cve-2023-4056).
Mozilla: memory safety bugs fixed in firefox esr 115.1, and thunderbird 115.1 (cve-2023-4057).
Thunderbird: file extension spoofing using the text direction override character (cve-2023-3417).
Mozilla: cookie jar overflow caused unexpected cookie jar state (cve-2023-4055).
- CentOS linux 7 x86_64.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Centos mirror patch for updates and patch information.
Vendor References
- centos mirror -
mirror.centos.org/centos/7/updates/x86_64/Packages/?C=M;O=D
CVEs related to QID 257268
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| centos mirror |
|