[RHSA-2023:5224] thunderbird security update
Severity
Important
Affected Packages
4
CVEs
2
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.15.1.
Security Fix(es):
- libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-9.2 | < 102.15.1-1.el9_2 |
pkg:rpm/redhat/thunderbird?arch=s390x&distro=redhat-9.2 | < 102.15.1-1.el9_2 |
pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-9.2 | < 102.15.1-1.el9_2 |
pkg:rpm/redhat/thunderbird?arch=aarch64&distro=redhat-9.2 | < 102.15.1-1.el9_2 |
- ID
- RHSA-2023:5224
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:5224
- Published
-
2023-09-19T00:00:00
(12 months ago) - Modified
-
2023-09-19T00:00:00
(12 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2023-2290
- ALAS2-2023-2291
- ALAS2-2023-2337
- ALPINE:CVE-2023-4863
- ALPINE:CVE-2023-5129
- ALSA-2023:5184
- ALSA-2023:5200
- ALSA-2023:5201
- ALSA-2023:5214
- ALSA-2023:5224
- ALSA-2023:5309
- CISA-2023:0913
- DSA-5496-1
- DSA-5497-1
- DSA-5497-2
- DSA-5498-1
- ELSA-2023-5184
- ELSA-2023-5191
- ELSA-2023-5197
- ELSA-2023-5200
- ELSA-2023-5201
- ELSA-2023-5214
- ELSA-2023-5224
- ELSA-2023-5309
- FEDORA-2023-09ec498a2a
- FEDORA-2023-0cd03c3746
- FEDORA-2023-2a0668fe43
- FEDORA-2023-3388038193
- FEDORA-2023-3bfb63f6d2
- FEDORA-2023-6bdc468df7
- FEDORA-2023-9108cda47c
- FEDORA-2023-97eea79acb
- FEDORA-2023-b427f54e68
- FEDORA-2023-bbb8d72c6f
- FEDORA-2023-c4fa8a204d
- FEDORA-2023-c890266d3f
- FEDORA-2023-d66a01ad4f
- FEDORA-2023-e692a72898
- FEDORA-2023-f8319bd876
- FREEBSD:3693ECA5-F0D3-453C-9558-2353150495BB
- FREEBSD:4FD7A2FC-5860-11EE-A1B3-DCA632DAF43B
- FREEBSD:58A738D4-57AF-11EE-8C58-B42E991FC52E
- FREEBSD:773CE35B-EABB-47E0-98CA-669B2B98107A
- FREEBSD:88754D55-521A-11EE-8290-A8A1599412C6
- GLSA-202309-05
- GLSA-202401-10
- MFSA-2023-40
- MS:CVE-2023-4863
- NPM:GHSA-J7HP-H8JX-5PPR
- openSUSE-SU-2023:0246-1
- openSUSE-SU-2023:0247-1
- openSUSE-SU-2023:0278-1
- RHSA-2023:5184
- RHSA-2023:5191
- RHSA-2023:5197
- RHSA-2023:5200
- RHSA-2023:5201
- RHSA-2023:5214
- RHSA-2023:5309
- RLSA-2023:5184
- RLSA-2023:5201
- RLSA-2023:5214
- RLSA-2023:5309
- RUSTSEC-2023-0060
- RUSTSEC-2023-0061
- SSA:2023-256-04
- SSA:2023-257-01
- SSA:2023-264-03
- SUSE-SU-2023:3609-1
- SUSE-SU-2023:3610-1
- SUSE-SU-2023:3626-1
- SUSE-SU-2023:3634-1
- SUSE-SU-2023:3664-1
- SUSE-SU-2023:3794-1
- SUSE-SU-2023:3829-1
- USN-6367-1
- USN-6368-1
- USN-6369-1
- USN-6369-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2238431 | https://bugzilla.redhat.com/2238431 | |
Bugzilla | 2240759 | https://bugzilla.redhat.com/2240759 | |
RHSA | RHSA-2023:5224 | https://access.redhat.com/errata/RHSA-2023:5224 | |
CVE | CVE-2023-4863 | https://access.redhat.com/security/cve/CVE-2023-4863 | |
CVE | CVE-2023-5129 | https://access.redhat.com/security/cve/CVE-2023-5129 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-9.2 | redhat | thunderbird | < 102.15.1-1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/thunderbird?arch=s390x&distro=redhat-9.2 | redhat | thunderbird | < 102.15.1-1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-9.2 | redhat | thunderbird | < 102.15.1-1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/thunderbird?arch=aarch64&distro=redhat-9.2 | redhat | thunderbird | < 102.15.1-1.el9_2 | redhat-9.2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |