Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
thunderbird: 115.16/128.3 ()
firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service (CVE-2024-9399)
firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 (CVE-2024-9403)
firefox: thunderbird: Potential directory upload bypass via clickjacking (CVE-2024-9397)
firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 (CVE-2024-9401)
firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 (CVE-2024-9402)
firefox: thunderbird: External protocol handlers could be enumerated via popups (CVE-2024-9398)
firefox: thunderbird: Potential memory corruption during JIT compilation (CVE-2024-9400)
firefox: thunderbird: Potential memory corruption may occur when cloning certain objects (CVE-2024-9396)
firefox: thunderbird: Cross-origin access to PDF contents through multipart responses (CVE-2024-9393)
firefox: thunderbird: Cross-origin access to JSON contents through multipart responses (CVE-2024-9394)
firefox: thunderbird: Compromised content process can bypass site isolation (CVE-2024-9392)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
bugzilla.redhat.com/show_bug.cgi?id=2314431
bugzilla.redhat.com/show_bug.cgi?id=2315945
bugzilla.redhat.com/show_bug.cgi?id=2315947
bugzilla.redhat.com/show_bug.cgi?id=2315949
bugzilla.redhat.com/show_bug.cgi?id=2315950
bugzilla.redhat.com/show_bug.cgi?id=2315951
bugzilla.redhat.com/show_bug.cgi?id=2315952
bugzilla.redhat.com/show_bug.cgi?id=2315953
bugzilla.redhat.com/show_bug.cgi?id=2315954
bugzilla.redhat.com/show_bug.cgi?id=2315956
bugzilla.redhat.com/show_bug.cgi?id=2315957
bugzilla.redhat.com/show_bug.cgi?id=2315959
errata.rockylinux.org/RLSA-2024:7699