Critical Security Advisory for Thunderbird: Mageia 2024-0231
Summary
Use-after-free in networking. (CVE-2024-5702)
Use-after-free in JavaScript object transplant. (CVE-2024-5688)
External protocol handlers leaked by timing attack. (CVE-2024-5690)
Sandboxed iframes were able to bypass sandbox restrictions to open a new
window. (CVE-2024-5691)
Cross-Origin Image leak via Offscreen Canvas. (CVE-2024-5693)
Memory Corruption in Text Fragments. (CVE-2024-5696)
Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and
Thunderbird 115.12. (CVE-2024-5700)
References
- https://bugs.mageia.org/show_bug.cgi?id=33311
- https://www.thunderbird.net/en-US/thunderbird/115.12.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-28/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
Resolution
MGASA-2024-0231 - Updated thunderbird packages fix security vulnerabilities
SRPMS
- 9/core/thunderbird-115.12.0-1.mga9
- 9/core/thunderbird-l10n-115.12.0-1.mga9