[RLSA-2024:2888] thunderbird security update
An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.11.0.
Security Fix(es):
firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)
firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)
firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)
firefox: Cross-origin responses could be distinguished between script and
non-script content-types (CVE-2024-4769)firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)
firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and
Thunderbird 115.11 (CVE-2024-4777)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/thunderbird?arch=x86_64&distro=rockylinux-9.4 | < 115.11.0-1.el9_4 |
pkg:rpm/rockylinux/thunderbird?arch=aarch64&distro=rockylinux-9.4 | < 115.11.0-1.el9_4 |
- ID
- RLSA-2024:2888
- Severity
- important
- URL
- https://errata.rockylinux.org/RLSA-2024:2888
- Published
-
2024-06-14T14:00:40
(6 months ago) - Modified
-
2024-06-14T14:02:43
(6 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALAS2-2024-2561
- ALSA-2024:2883
- ALSA-2024:2888
- ALSA-2024:3783
- ALSA-2024:3784
- DSA-5691-1
- DSA-5693-1
- DSA-5742-1
- ELSA-2024-2881
- ELSA-2024-2883
- ELSA-2024-2888
- ELSA-2024-2913
- ELSA-2024-3783
- ELSA-2024-3784
- FREEBSD:F848EF90-1848-11EF-9850-001B217B3468
- MFSA-2024-21
- MFSA-2024-22
- MFSA-2024-23
- NPM:GHSA-WGRM-67XF-HHPQ
- RHSA-2024:2881
- RHSA-2024:2883
- RHSA-2024:2888
- RHSA-2024:2913
- RHSA-2024:3783
- RHSA-2024:3784
- RLSA-2024:3783
- RLSA-2024:3784
- SSA:2024-135-01
- SSA:2024-164-01
- SUSE-SU-2024:1676-1
- SUSE-SU-2024:1770-1
- SUSE-SU-2024:1858-1
- USN-6779-1
- USN-6782-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2024-4367 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367 | |
CVE | CVE-2024-4767 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767 | |
CVE | CVE-2024-4768 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768 | |
CVE | CVE-2024-4769 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769 | |
CVE | CVE-2024-4770 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770 | |
CVE | CVE-2024-4777 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777 | |
Bugzilla | 2280382 | https://bugzilla.redhat.com/show_bug.cgi?id=2280382 | |
Bugzilla | 2280383 | https://bugzilla.redhat.com/show_bug.cgi?id=2280383 | |
Bugzilla | 2280384 | https://bugzilla.redhat.com/show_bug.cgi?id=2280384 | |
Bugzilla | 2280385 | https://bugzilla.redhat.com/show_bug.cgi?id=2280385 | |
Bugzilla | 2280386 | https://bugzilla.redhat.com/show_bug.cgi?id=2280386 | |
Bugzilla | 2280387 | https://bugzilla.redhat.com/show_bug.cgi?id=2280387 | |
Self | RLSA-2024:2888 | https://errata.rockylinux.org/RLSA-2024:2888 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/thunderbird?arch=x86_64&distro=rockylinux-9.4 | rockylinux | thunderbird | < 115.11.0-1.el9_4 | rockylinux-9.4 | x86_64 | |
Affected | pkg:rpm/rockylinux/thunderbird?arch=aarch64&distro=rockylinux-9.4 | rockylinux | thunderbird | < 115.11.0-1.el9_4 | rockylinux-9.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |