Updated thunderbird packages fix security vulnerability
Publication date: 23 Sep 2021Modification date: 23 Sep 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-38493
Description
Mozilla developers Tyson Smith and Gabriele Svelto reported memory safety bugs present in Thunderbird ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2021-38493). The thunderbird package has been updated to the 91 branch. See the upstream release notes for details.
References
- https://bugs.mageia.org/show_bug.cgi?id=29378
- https://www.mozilla.org/en-US/security/advisories/mfsa2021-42/
- https://www.thunderbird.net/en-US/thunderbird/91.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.0.1/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.0.2/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.0.3/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.1.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.1.1/releasenotes/
- https://access.redhat.com/errata/RHSA-2021:3494
- https://bugs.mageia.org/show_bug.cgi?id=29471
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493
SRPMS
8/core
- thunderbird-91.1.1-1.mga8
- thunderbird-l10n-91.1.1-1.mga8