QID 354912

Date Published: 2023-05-03

QID 354912: Amazon Linux Security Advisory for thunderbird : ALAS2-2023-2028

the mozilla foundation describes this issue as follows: ocsp revocation status of recipient certificates was not checked when sending s/mime encrypted email, and revoked certificates would be accepted.
Thunderbird versions from 68 to 102.9.1 were affected by this bug. (
( CVE-2023-0547) the mozilla foundation describes this issue as follows: unexpected data returned from the safe browsing api could have led to memory corruption and a potentially exploitable crash. (
( CVE-2023-1945) the mozilla foundation describes this issue as follows: certain malformed openpgp messages could trigger incorrect parsing of pkesk/skesk packets due to a bug in the ribose rnp library used by thunderbird up to version 102.9.1, which would cause the thunderbird user interface to hang.
The issue was discovered using googles oss-fuzz. (
( CVE-2023-29479) the mozilla foundation describes this issue as follows: a website could have obscured the fullscreen notification by using a combination of window.open, fullscreen requests, window.name assignments, and setinterval calls.
This could have led to user confusion and possible spoofing attacks. (
( CVE-2023-29533) the mozilla foundation describes this issue as follows: following a garbage collector compaction, weak maps may have been accessed before they were correctly traced.
This resulted in memory corruption and a potentially exploitable crash. (
( CVE-2023-29535) the mozilla foundation describes this issue as follows: an attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. (
( CVE-2023-29550)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2023-2028 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2023-2028 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2023-2028.html