[ALSA-2024:9552] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2024-11-18
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-128.4.0-1.el9_5.alma.1.aarch64.rpm 2f4a170618794d57f2f409adff557a0cdbf7243a1905b958ee04eb967ba1e1a6
ppc64le thunderbird-128.4.0-1.el9_5.alma.1.ppc64le.rpm a725f57754067f7a9aa9c7f8ee2a01fcfcd4bb94e54d13fb36dd2e6e8d22e4fa
s390x thunderbird-128.4.0-1.el9_5.alma.1.s390x.rpm e1430c760e2d4ee57426e8c75271de257cb38951224a1f2695981e740dd1c6ea
x86_64 thunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpm dee9c21608c2201c2c0b4d1b08d92367b77b5e7797266f3e03f2e8f40b90b15e
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.