RLSA-2024:4036

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:4036.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:4036
Related
  • CVE-2024-5688
  • CVE-2024-5690
  • CVE-2024-5691
  • CVE-2024-5693
  • CVE-2024-5696
  • CVE-2024-5700
  • CVE-2024-5702
Published
2024-07-02T14:10:24.883859Z
Modified
2024-07-02T14:13:09.793735Z
Summary
Important: thunderbird security update
Details

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.12.1.

Security Fix(es):

  • thunderbird: Use-after-free in networking (CVE-2024-5702)

  • thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688)

  • thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690)

  • thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)

  • thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)

  • thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696)

  • thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:115.12.1-1.el8_10