{"id":"ALSA-2023:0824","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 102.8.0.\n\nSecurity Fix(es):\n\n* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)\n* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)\n* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)\n* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)\n* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)\n* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)\n* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)\n* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)\n* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)\n* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)\n* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)\n* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)\n* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T03:58:14.506141Z","published":"2023-02-20T00:00:00Z","related":["CVE-2023-0616","CVE-2023-0767","CVE-2023-25728","CVE-2023-25729","CVE-2023-25730","CVE-2023-25732","CVE-2023-25735","CVE-2023-25737","CVE-2023-25739","CVE-2023-25742","CVE-2023-25743","CVE-2023-25744","CVE-2023-25746"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:0824"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0616"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0767"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25728"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25729"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25730"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25732"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25735"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25737"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25739"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25742"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25743"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25744"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25746"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170375"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170391"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170402"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2171397"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2023-0824.html"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.8.0-2.el9_1.alma"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:0824.json"}}],"schema_version":"1.7.3"}