Mageia 2024-0191: thunderbird Security Advisory Updates
Summary
Arbitrary JavaScript execution in PDF.js. (CVE-2024-4367)
IndexedDB files retained in private browsing mode. (CVE-2024-4767)
Potential permissions request bypass via clickjacking. (CVE-2024-4768)
Cross-origin responses could be distinguished between script and
non-script content-types. (CVE-2024-4769)
Use-after-free could occur when printing to PDF. (CVE-2024-4770)
Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and
Thunderbird 115.11. (CVE-2024-4777)
References
- https://bugs.mageia.org/show_bug.cgi?id=33218
- https://www.thunderbird.net/en-US/thunderbird/115.11.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
Resolution
MGASA-2024-0191 - Updated thunderbird packages fix security vulnerabilities
SRPMS
- 9/core/thunderbird-115.11.0-1.mga9
- 9/core/thunderbird-l10n-115.11.0-1.mga9