Vulnerability Database
Blog
FAQ
Docs
RHSA-2023:4492
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2023:4492
Import Source
https://security.access.redhat.com/data/osv/RHSA-2023:4492.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2023:4492
Related
CVE-2023-3417
CVE-2023-4045
CVE-2023-4046
CVE-2023-4047
CVE-2023-4048
CVE-2023-4049
CVE-2023-4050
CVE-2023-4055
CVE-2023-4056
CVE-2023-4057
Published
2024-09-16T12:38:49Z
Modified
2024-09-16T12:38:49Z
Severity
9.8 (Critical)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: thunderbird security update
Details
References
https://access.redhat.com/errata/RHSA-2023:4492
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2225325
https://bugzilla.redhat.com/show_bug.cgi?id=2228360
https://bugzilla.redhat.com/show_bug.cgi?id=2228361
https://bugzilla.redhat.com/show_bug.cgi?id=2228362
https://bugzilla.redhat.com/show_bug.cgi?id=2228363
https://bugzilla.redhat.com/show_bug.cgi?id=2228364
https://bugzilla.redhat.com/show_bug.cgi?id=2228365
https://bugzilla.redhat.com/show_bug.cgi?id=2228367
https://bugzilla.redhat.com/show_bug.cgi?id=2228370
https://bugzilla.redhat.com/show_bug.cgi?id=2228371
https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_4492.json
https://access.redhat.com/security/cve/CVE-2023-3417
https://www.cve.org/CVERecord?id=CVE-2023-3417
https://nvd.nist.gov/vuln/detail/CVE-2023-3417
https://www.mozilla.org/en-US/security/advisories/mfsa2023-27/#CVE-2023-3417
https://www.mozilla.org/en-US/security/advisories/mfsa2023-28/#CVE-2023-3417
https://access.redhat.com/security/cve/CVE-2023-4045
https://www.cve.org/CVERecord?id=CVE-2023-4045
https://nvd.nist.gov/vuln/detail/CVE-2023-4045
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4045
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4045
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4045
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4045
https://access.redhat.com/security/cve/CVE-2023-4046
https://www.cve.org/CVERecord?id=CVE-2023-4046
https://nvd.nist.gov/vuln/detail/CVE-2023-4046
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4046
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4046
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4046
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4046
https://access.redhat.com/security/cve/CVE-2023-4047
https://www.cve.org/CVERecord?id=CVE-2023-4047
https://nvd.nist.gov/vuln/detail/CVE-2023-4047
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4047
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4047
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4047
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4047
https://access.redhat.com/security/cve/CVE-2023-4048
https://www.cve.org/CVERecord?id=CVE-2023-4048
https://nvd.nist.gov/vuln/detail/CVE-2023-4048
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4048
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4048
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4048
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4048
https://access.redhat.com/security/cve/CVE-2023-4049
https://www.cve.org/CVERecord?id=CVE-2023-4049
https://nvd.nist.gov/vuln/detail/CVE-2023-4049
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4049
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4049
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4049
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4049
https://access.redhat.com/security/cve/CVE-2023-4050
https://www.cve.org/CVERecord?id=CVE-2023-4050
https://nvd.nist.gov/vuln/detail/CVE-2023-4050
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4050
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4050
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4050
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4050
https://access.redhat.com/security/cve/CVE-2023-4055
https://www.cve.org/CVERecord?id=CVE-2023-4055
https://nvd.nist.gov/vuln/detail/CVE-2023-4055
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4055
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4055
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4055
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4055
https://access.redhat.com/security/cve/CVE-2023-4056
https://www.cve.org/CVERecord?id=CVE-2023-4056
https://nvd.nist.gov/vuln/detail/CVE-2023-4056
https://www.mozilla.org/en-US/security/advisories/mfsa2023-30/#CVE-2023-4056
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4056
https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4056
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4056
https://access.redhat.com/security/cve/CVE-2023-4057
https://www.cve.org/CVERecord?id=CVE-2023-4057
https://nvd.nist.gov/vuln/detail/CVE-2023-4057
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4057
https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4057
Affected packages
Red Hat:rhel_e4s:8.1::appstream
/
thunderbird
Package
Name
thunderbird
Purl
pkg:rpm/redhat/thunderbird
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:102.14.0-1.el8_1
Red Hat:rhel_e4s:8.1::appstream
/
thunderbird-debuginfo
Package
Name
thunderbird-debuginfo
Purl
pkg:rpm/redhat/thunderbird-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:102.14.0-1.el8_1
Red Hat:rhel_e4s:8.1::appstream
/
thunderbird-debugsource
Package
Name
thunderbird-debugsource
Purl
pkg:rpm/redhat/thunderbird-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:102.14.0-1.el8_1
RHSA-2023:4492 - OSV