public inbox for gentoo-announce@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-announce] [ GLSA 202305-36 ] Mozilla Thunderbird: Multiple Vulnerabilities
@ 2023-05-30  3:03 glsamaker
  0 siblings, 0 replies; only message in thread
From: glsamaker @ 2023-05-30  3:03 UTC (permalink / raw
  To: gentoo-announce

[-- Attachment #1: Type: text/plain, Size: 5068 bytes --]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 202305-36
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
    Title: Mozilla Thunderbird: Multiple Vulnerabilities
     Date: May 30, 2023
     Bugs: #895960, #903619, #905890
       ID: 202305-36

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been discovered in Mozilla Thunderbird,
the worst of which could result in arbitrary code execution.

Background
==========

Mozilla Thunderbird is a popular open-source email client from the
Mozilla project.

Affected packages
=================

Package                      Vulnerable    Unaffected
---------------------------  ------------  ------------
mail-client/thunderbird      < 102.10.0    >= 102.10.0
mail-client/thunderbird-bin  < 102.10.0    >= 102.10.0

Description
===========

Multiple vulnerabilities have been discovered in Mozilla Thunderbird.
Please review the CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Mozilla Thunderbird users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.10.0"

All Mozilla Thunderbird binary users should upgrade to the latest
version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.10.0"

References
==========

[ 1 ] CVE-2023-0616
      https://nvd.nist.gov/vuln/detail/CVE-2023-0616
[ 2 ] CVE-2023-0767
      https://nvd.nist.gov/vuln/detail/CVE-2023-0767
[ 3 ] CVE-2023-1945
      https://nvd.nist.gov/vuln/detail/CVE-2023-1945
[ 4 ] CVE-2023-1999
      https://nvd.nist.gov/vuln/detail/CVE-2023-1999
[ 5 ] CVE-2023-25728
      https://nvd.nist.gov/vuln/detail/CVE-2023-25728
[ 6 ] CVE-2023-25729
      https://nvd.nist.gov/vuln/detail/CVE-2023-25729
[ 7 ] CVE-2023-25730
      https://nvd.nist.gov/vuln/detail/CVE-2023-25730
[ 8 ] CVE-2023-25732
      https://nvd.nist.gov/vuln/detail/CVE-2023-25732
[ 9 ] CVE-2023-25734
      https://nvd.nist.gov/vuln/detail/CVE-2023-25734
[ 10 ] CVE-2023-25735
      https://nvd.nist.gov/vuln/detail/CVE-2023-25735
[ 11 ] CVE-2023-25737
      https://nvd.nist.gov/vuln/detail/CVE-2023-25737
[ 12 ] CVE-2023-25738
      https://nvd.nist.gov/vuln/detail/CVE-2023-25738
[ 13 ] CVE-2023-25739
      https://nvd.nist.gov/vuln/detail/CVE-2023-25739
[ 14 ] CVE-2023-25740
      https://nvd.nist.gov/vuln/detail/CVE-2023-25740
[ 15 ] CVE-2023-25741
      https://nvd.nist.gov/vuln/detail/CVE-2023-25741
[ 16 ] CVE-2023-25742
      https://nvd.nist.gov/vuln/detail/CVE-2023-25742
[ 17 ] CVE-2023-25743
      https://nvd.nist.gov/vuln/detail/CVE-2023-25743
[ 18 ] CVE-2023-25744
      https://nvd.nist.gov/vuln/detail/CVE-2023-25744
[ 19 ] CVE-2023-25745
      https://nvd.nist.gov/vuln/detail/CVE-2023-25745
[ 20 ] CVE-2023-25746
      https://nvd.nist.gov/vuln/detail/CVE-2023-25746
[ 21 ] CVE-2023-25751
      https://nvd.nist.gov/vuln/detail/CVE-2023-25751
[ 22 ] CVE-2023-25752
      https://nvd.nist.gov/vuln/detail/CVE-2023-25752
[ 23 ] CVE-2023-28162
      https://nvd.nist.gov/vuln/detail/CVE-2023-28162
[ 24 ] CVE-2023-28163
      https://nvd.nist.gov/vuln/detail/CVE-2023-28163
[ 25 ] CVE-2023-28164
      https://nvd.nist.gov/vuln/detail/CVE-2023-28164
[ 26 ] CVE-2023-28176
      https://nvd.nist.gov/vuln/detail/CVE-2023-28176
[ 27 ] CVE-2023-28427
      https://nvd.nist.gov/vuln/detail/CVE-2023-28427
[ 28 ] CVE-2023-29533
      https://nvd.nist.gov/vuln/detail/CVE-2023-29533
[ 29 ] CVE-2023-29535
      https://nvd.nist.gov/vuln/detail/CVE-2023-29535
[ 30 ] CVE-2023-29536
      https://nvd.nist.gov/vuln/detail/CVE-2023-29536
[ 31 ] CVE-2023-29539
      https://nvd.nist.gov/vuln/detail/CVE-2023-29539
[ 32 ] CVE-2023-29541
      https://nvd.nist.gov/vuln/detail/CVE-2023-29541
[ 33 ] CVE-2023-29548
      https://nvd.nist.gov/vuln/detail/CVE-2023-29548
[ 34 ] CVE-2023-29550
      https://nvd.nist.gov/vuln/detail/CVE-2023-29550

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/202305-36

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-05-30  3:10 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-05-30  3:03 [gentoo-announce] [ GLSA 202305-36 ] Mozilla Thunderbird: Multiple Vulnerabilities glsamaker

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox