[RHSA-2021:5045] thunderbird security update

Severity Important
Affected Packages 4
CVEs 11

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 91.4.0.

Security Fix(es):

  • Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 (BZ#2030116)

  • Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536)

  • Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537)

  • Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538)

  • Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539)

  • Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541)

  • Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542)

  • Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543)

  • Mozilla: JavaScript unexpectedly enabled for the composition area (CVE-2021-43528)

  • Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545)

  • Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-8.5 redhat thunderbird < 91.4.0-2.el8_5 redhat-8.5 x86_64
Affected pkg:rpm/redhat/thunderbird?arch=s390x&distro=redhat-8.5 redhat thunderbird < 91.4.0-2.el8_5 redhat-8.5 s390x
Affected pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-8.5 redhat thunderbird < 91.4.0-2.el8_5 redhat-8.5 ppc64le
Affected pkg:rpm/redhat/thunderbird?arch=aarch64&distro=redhat-8.5 redhat thunderbird < 91.4.0-2.el8_5 redhat-8.5 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...