Certain malformed OpenPGP messages could trigger incorrect parsing of PKESK/SKESK packets due to a bug in the Ribose RNP library used by Thunderbird up to version 102.9.1, which would cause the Thunderbird user interface to hang. The issue was discovered using Google's oss-fuzz. References: https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#CVE-2023-29479
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:1803 https://access.redhat.com/errata/RHSA-2023:1803
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:1805 https://access.redhat.com/errata/RHSA-2023:1805
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:1804 https://access.redhat.com/errata/RHSA-2023:1804
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1802 https://access.redhat.com/errata/RHSA-2023:1802
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:1809 https://access.redhat.com/errata/RHSA-2023:1809
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:1810 https://access.redhat.com/errata/RHSA-2023:1810
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:1806 https://access.redhat.com/errata/RHSA-2023:1806
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1811 https://access.redhat.com/errata/RHSA-2023:1811
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-29479