{"schema_version": "1.3.1", "id": "RLSA-2024:0003", "modified": "2024-01-09T04:09:09.079687Z", "published": "2024-01-09T04:07:41.151483Z", "related": ["CVE-2023-50761", "CVE-2023-50762", "CVE-2023-6856", "CVE-2023-6857", "CVE-2023-6858", "CVE-2023-6859", "CVE-2023-6860", "CVE-2023-6861", "CVE-2023-6862", "CVE-2023-6863", "CVE-2023-6864"], "summary": "Important: thunderbird security update", "details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 115.6.0.\n\nSecurity Fix(es):\n\n* Mozilla: Heap-buffer-overflow affecting WebGL DrawElementsInstanced
method with Mesa VM driver (CVE-2023-6856)\n\n* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)\n\n* Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761)\n\n* Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762)\n\n* Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)\n\n* Mozilla: Heap buffer overflow in nsTextFragment
(CVE-2023-6858)\n\n* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)\n\n* Mozilla: Potential sandbox escape due to VideoBridge
lack of texture validation (CVE-2023-6860)\n\n* Mozilla: Heap buffer overflow affected nsWindow::PickerOpen(void)
in headless mode (CVE-2023-6861)\n\n* Mozilla: Use-after-free in nsDNSService
(CVE-2023-6862)\n\n* Mozilla: Undefined behavior in ShutdownObserver()
(CVE-2023-6863)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "thunderbird", "purl": "pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-8&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:115.6.0-1.el8_9"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2024:0003"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255360"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255362"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255363"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255364"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255365"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255367"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255368"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255369"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255370"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255378"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255379"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}