{"id":"ALSA-2024:0003","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 115.6.0.\n\nSecurity Fix(es):\n\n* Mozilla: Heap-buffer-overflow affecting WebGL \u003ccode\u003eDrawElementsInstanced\u003c/code\u003e method with Mesa VM driver (CVE-2023-6856)\n* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)\n* Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761)\n* Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762)\n* Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)\n* Mozilla: Heap buffer overflow in \u003ccode\u003ensTextFragment\u003c/code\u003e (CVE-2023-6858)\n* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)\n* Mozilla: Potential sandbox escape due to \u003ccode\u003eVideoBridge\u003c/code\u003e lack of texture validation (CVE-2023-6860)\n* Mozilla: Heap buffer overflow affected \u003ccode\u003ensWindow::PickerOpen(void)\u003c/code\u003e in headless mode (CVE-2023-6861)\n* Mozilla: Use-after-free in \u003ccode\u003ensDNSService\u003c/code\u003e (CVE-2023-6862)\n* Mozilla: Undefined behavior in \u003ccode\u003eShutdownObserver()\u003c/code\u003e (CVE-2023-6863)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T02:18:34.265491Z","published":"2024-01-02T00:00:00Z","related":["CVE-2023-50761","CVE-2023-50762","CVE-2023-6856","CVE-2023-6857","CVE-2023-6858","CVE-2023-6859","CVE-2023-6860","CVE-2023-6861","CVE-2023-6862","CVE-2023-6863","CVE-2023-6864"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-50761"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-50762"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6856"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6857"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6858"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6859"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6860"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6862"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6863"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6864"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255362"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255363"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255365"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255368"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255370"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255379"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2024-0003.html"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.6.0-1.el8_9.alma"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:0003.json"}}],"schema_version":"1.7.3"}