Updated thunderbird packages fix security vulnerabilities
Publication date: 27 Feb 2024Modification date: 27 Feb 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-1546 , CVE-2024-1547 , CVE-2024-1548 , CVE-2024-1549 , CVE-2024-1550 , CVE-2024-1551 , CVE-2024-1552 , CVE-2024-1553
Description
The updated packages fix security vulnerabilities: Out-of-bounds memory read in networking channels. (CVE-2024-1546) Alert dialog could have been spoofed on another site. (CVE-2024-1547) Fullscreen Notification could have been hidden by select element. (CVE-2024-1548) Custom cursor could obscure the permission dialog. (CVE-2024-1549) Mouse cursor re-positioned unexpectedly could have led to unintended permission grants. (CVE-2024-1550) Multipart HTTP Responses would accept the Set-Cookie header in response parts. (CVE-2024-1551) Incorrect code generation on 32-bit ARM devices. (CVE-2024-1552) Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. (CVE-2024-1553)
References
- https://bugs.mageia.org/show_bug.cgi?id=32877
- https://www.thunderbird.net/en-US/thunderbird/115.8.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553
SRPMS
9/core
- thunderbird-115.8.0-1.mga9
- thunderbird-l10n-115.8.0-1.mga9