[ALSA-2024:8793] Moderate: thunderbird security update
Type:
security
Severity:
moderate
Release date:
2024-11-04
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-128.4.0-1.el9_4.alma.1.aarch64.rpm 94202b9226231b8d53497bdee22d20751f887fcefe8b8b1f2421df2bd7b9691f
ppc64le thunderbird-128.4.0-1.el9_4.alma.1.ppc64le.rpm 32dfa87f501ef9ecdfeacb4dbf7da6acfda089e4a6abf0e611b6752eac81f0df
s390x thunderbird-128.4.0-1.el9_4.alma.1.s390x.rpm 90399a724b3e18b22e3c10b79fff25b791e3e1ec7f1057ec79953a29b547e4d5
x86_64 thunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpm 648cbe704761d11a622a1369178a76ef40ec6ff898c60351949fb2ca2c683634
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.