MGASA-2023-0034

Source
https://advisories.mageia.org/MGASA-2023-0034.html
Import Source
https://advisories.mageia.org/MGASA-2023-0034.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0034
Related
Published
2023-02-07T00:06:39Z
Modified
2023-02-06T22:58:00Z
Summary
Updated thunderbird packages fix security vulnerability
Details

libusrsctp library out of date. (CVE-2022-46871)

Arbitrary file read from GTK drag and drop on Linux. (CVE-2023-23598)

URL being dragged from cross-origin iframe into same tab triggers navigation. (CVE-2023-23601)

Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers. (CVE-2023-23602)

Fullscreen notification bypass. (CVE-2022-46877)

Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive. (CVE-2023-23603)

Memory safety bugs fixed in Thunderbird 102.7. (CVE-2023-23605)

Revocation status of S/Mime signature certificates was not checked. (CVE-2023-0430)

References
Credits

Affected packages

Mageia:8 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
102.7.1-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
102.7.1-1.mga8

Ecosystem specific

{
    "section": "core"
}