{"schema_version": "1.3.1", "id": "RLSA-2024:8793", "modified": "2024-11-08T15:59:33.969986Z", "published": "2024-11-08T15:57:59.128395Z", "related": ["CVE-2024-10458", "CVE-2024-10459", "CVE-2024-10460", "CVE-2024-10461", "CVE-2024-10462", "CVE-2024-10463", "CVE-2024-10464", "CVE-2024-10465", "CVE-2024-10466", "CVE-2024-10467"], "summary": "Moderate: thunderbird security update", "details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSecurity Fix(es):\n\n* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)\n\n* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)\n\n* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)\n\n* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)\n\n* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)\n\n* firefox: thunderbird: Clipboard \"paste\" button persisted across tabs (CVE-2024-10465)\n\n* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)\n\n* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)\n\n* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)\n\n* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "thunderbird", "purl": "pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:128.4.0-1.el9_4"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2024:8793"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322424"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322425"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322428"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322429"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322433"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322434"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322438"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322439"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322440"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322444"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}