Mageia 2024-0151: thunderbird Security Advisory Updates
Summary
CVE-2024-3852: GetBoundName in the JIT returned the wrong object
CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
CVE-2024-3857: Incorrect JITting of arguments led to use-after-free
during garbage collection
CVE-2024-2609: Permission prompt input delay could expire when not in
focus
CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the
OpenType sanitizer
CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on
Windows
CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR
115.10, and Thunderbird 115.10
References
- https://bugs.mageia.org/show_bug.cgi?id=33123
- https://www.thunderbird.net/en-US/thunderbird/115.10.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/115.10.1/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-20/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864
Resolution
MGASA-2024-0151 - Updated thunderbird packages fix security vulnerabilities
SRPMS
- 9/core/thunderbird-115.10.1-1.mga9
- 9/core/thunderbird-l10n-115.10.1-1.mga9