{"id":"MGASA-2023-0309","summary":"Updated thunderbird packages fix security vulnerabilities","details":"The updated packages fix security vulnerabilities:\n\nQueued up rendering could have allowed websites to clickjack.\n(CVE-2023-5721)\n\nAddress bar spoofing via bidirectional characters. (CVE-2023-5732)\n\nLarge WebGL draw could have led to a crash. (CVE-2023-5724)\n\nWebExtensions could open arbitrary URLs. (CVE-2023-5725)\n\nImproper object tracking during GC in the JavaScript engine could have\nled to a crash. (CVE-2023-5728)\n\nMemory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and\nThunderbird 115.4.1. (CVE-2023-5730)\n","modified":"2026-01-31T23:18:11.515327Z","published":"2023-11-06T23:08:32Z","related":["CVE-2023-5721","CVE-2023-5724","CVE-2023-5725","CVE-2023-5728","CVE-2023-5730","CVE-2023-5732"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0309.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32478"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/115.4.1/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.4.1-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0309.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.4.1-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0309.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}