{"id":"USN-6563-1","summary":"thunderbird vulnerabilities","details":"Multiple security issues were discovered in Thunderbird. If a user were\ntricked into opening a specially crafted website in a browsing context, an\nattacker could potentially exploit these to cause a denial of service,\nobtain sensitive information, bypass security restrictions, cross-site\ntracing, or execute arbitrary code.(CVE-2023-6857, CVE-2023-6858,\nCVE-2023-6859, CVE-2023-6861, CVE-2023-6862, CVE-2023-6863, CVE-2023-6864)\n\nMarcus Brinkmann discovered that Thunderbird did not properly parse a PGP/MIME\npayload that contains digitally signed text. An attacker could potentially\nexploit this issue to spoof an email message. (CVE-2023-50762)\n\nMarcus Brinkmann discovered that Thunderbird did not properly compare the\nsignature creation date with the message date and time when using digitally\nsigned S/MIME email message. An attacker could potentially exploit this\nissue to spoof date and time of an email message. (CVE-2023-50761)\n\nDoHyun Lee discovered that Thunderbird did not properly manage memory when\nused on systems with the Mesa VM driver. An attacker could potentially\nexploit this issue to execute arbitrary code. (CVE-2023-6856)\n\nAndrew Osmond discovered that Thunderbird did not properly validate the\ntextures produced by remote decoders. An attacker could potentially exploit\nthis issue to escape the sandbox. (CVE-2023-6860)\n","modified":"2026-04-22T10:42:45.454623Z","published":"2024-01-02T09:28:23Z","related":["UBUNTU-CVE-2023-50761","UBUNTU-CVE-2023-50762","UBUNTU-CVE-2023-6856","UBUNTU-CVE-2023-6857","UBUNTU-CVE-2023-6858","UBUNTU-CVE-2023-6859","UBUNTU-CVE-2023-6860","UBUNTU-CVE-2023-6861","UBUNTU-CVE-2023-6862","UBUNTU-CVE-2023-6863","UBUNTU-CVE-2023-6864"],"upstream":["CVE-2023-50761","CVE-2023-50762","CVE-2023-6856","CVE-2023-6857","CVE-2023-6858","CVE-2023-6859","CVE-2023-6860","CVE-2023-6861","CVE-2023-6862","CVE-2023-6863","CVE-2023-6864","UBUNTU-CVE-2023-50761","UBUNTU-CVE-2023-50762","UBUNTU-CVE-2023-6856","UBUNTU-CVE-2023-6857","UBUNTU-CVE-2023-6858","UBUNTU-CVE-2023-6859","UBUNTU-CVE-2023-6860","UBUNTU-CVE-2023-6861","UBUNTU-CVE-2023-6862","UBUNTU-CVE-2023-6863","UBUNTU-CVE-2023-6864"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6563-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6856"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6857"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6858"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6859"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6860"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6862"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6863"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50761"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50762"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:115.6.0+build2-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:115.6.0+build2-0ubuntu0.20.04.1"}]}],"versions":["1:68.1.2+build1-0ubuntu1","1:68.1.2+build1-0ubuntu2","1:68.2.1+build1-0ubuntu1","1:68.2.2+build1-0ubuntu1","1:68.3.0+build2-0ubuntu1","1:68.3.1+build1-0ubuntu2","1:68.4.1+build1-0ubuntu1","1:68.4.2+build2-0ubuntu1","1:68.5.0+build1-0ubuntu1","1:68.6.0+build2-0ubuntu1","1:68.7.0+build1-0ubuntu1","1:68.7.0+build1-0ubuntu2","1:68.8.0+build2-0ubuntu0.20.04.2","1:68.10.0+build1-0ubuntu0.20.04.1","1:78.7.1+build1-0ubuntu0.20.04.1","1:78.8.1+build1-0ubuntu0.20.04.1","1:78.11.0+build1-0ubuntu0.20.04.2","1:78.13.0+build1-0ubuntu0.20.04.2","1:78.14.0+build1-0ubuntu0.20.04.1","1:78.14.0+build1-0ubuntu0.20.04.2","1:91.5.0+build1-0ubuntu0.20.04.1","1:91.7.0+build2-0ubuntu0.20.04.1","1:91.8.1+build1-0ubuntu0.20.04.1","1:91.9.1+build1-0ubuntu0.20.04.1","1:91.11.0+build2-0ubuntu0.20.04.1","1:102.2.2+build1-0ubuntu0.20.04.1","1:102.4.2+build2-0ubuntu0.20.04.1","1:102.7.1+build2-0ubuntu0.20.04.1","1:102.8.0+build2-0ubuntu0.20.04.1","1:102.9.0+build1-0ubuntu0.20.04.1","1:102.10.0+build2-0ubuntu0.20.04.1","1:102.11.0+build1-0ubuntu0.20.04.1","1:102.13.0+build1-0ubuntu0.20.04.1","1:102.15.0+build1-0ubuntu0.20.04.1","1:102.15.1+build1-0ubuntu0.20.04.1","1:115.3.1+build1-0ubuntu0.20.04.1","1:115.4.1+build1-0ubuntu0.20.04.1","1:115.5.0+build1-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:115.6.0+build2-0ubuntu0.20.04.1","binary_name":"thunderbird"},{"binary_version":"1:115.6.0+build2-0ubuntu0.20.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:115.6.0+build2-0ubuntu0.20.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:115.6.0+build2-0ubuntu0.20.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:115.6.0+build2-0ubuntu0.20.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:115.6.0+build2-0ubuntu0.20.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-6856","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6857","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6858","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6859","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6860","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6861","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6862","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6863","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6864","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50761","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50762","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6563-1.json"}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:115.6.0+build2-0ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:115.6.0+build2-0ubuntu0.22.04.1"}]}],"versions":["1:91.1.2+build1-0ubuntu1","1:91.3.0+build2-0ubuntu1","1:91.3.1+build1-0ubuntu1","1:91.3.2+build1-0ubuntu1","1:91.4.0+build1.1-0ubuntu1","1:91.4.0+build2-0ubuntu1","1:91.5.0+build1-0ubuntu1","1:91.5.1+build1-0ubuntu1","1:91.6.1+build1-0ubuntu1","1:91.7.0+build1-0ubuntu1","1:91.7.0+build2-0ubuntu1","1:91.8.0+build2-0ubuntu1","1:91.9.1+build1-0ubuntu0.22.04.1","1:91.11.0+build2-0ubuntu0.22.04.1","1:102.2.2+build1-0ubuntu0.22.04.1","1:102.4.2+build2-0ubuntu0.22.04.1","1:102.7.1+build2-0ubuntu0.22.04.1","1:102.8.0+build2-0ubuntu0.22.04.1","1:102.9.0+build1-0ubuntu0.22.04.1","1:102.10.0+build2-0ubuntu0.22.04.1","1:102.11.0+build1-0ubuntu0.22.04.1","1:102.13.0+build1-0ubuntu0.22.04.1","1:102.15.0+build1-0ubuntu0.22.04.1","1:102.15.1+build1-0ubuntu0.22.04.1","1:115.3.1+build1-0ubuntu0.22.04.2","1:115.4.1+build1-0ubuntu0.22.04.1","1:115.5.0+build1-0ubuntu0.22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:115.6.0+build2-0ubuntu0.22.04.1","binary_name":"thunderbird"},{"binary_version":"1:115.6.0+build2-0ubuntu0.22.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:115.6.0+build2-0ubuntu0.22.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:115.6.0+build2-0ubuntu0.22.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:115.6.0+build2-0ubuntu0.22.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:115.6.0+build2-0ubuntu0.22.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-6856","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6857","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6858","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6859","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6860","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6861","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6862","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6863","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-6864","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50761","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50762","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6563-1.json"}}],"schema_version":"1.7.5"}