RLSA-2024:10591

Source
https://errata.rockylinux.org/RLSA-2024:10591
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:10591.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:10591
Related
  • CVE-2024-11159
  • CVE-2024-11692
  • CVE-2024-11694
  • CVE-2024-11695
  • CVE-2024-11696
  • CVE-2024-11697
  • CVE-2024-11699
Published
2024-12-19T04:18:05.672002Z
Modified
2024-12-19T04:20:55.910965Z
Summary
Important: thunderbird security update
Details

Mozilla Thunderbird is a standalone mail and newsgroup client.

Security Fix(es):

  • thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message (CVE-2024-11159)

  • firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims (CVE-2024-11694)

  • firefox: thunderbird: Unhandled Exception in Add-on Signature Verification (CVE-2024-11696)

  • firefox: thunderbird: Select list elements could be shown over another site (CVE-2024-11692)

  • firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 (CVE-2024-11699)

  • firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters (CVE-2024-11695)

  • firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog (CVE-2024-11697)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:128.5.0-1.el8_10