{"id":"ALSA-2024:9552","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.  \n\nSecurity Fix(es):  \n\n  * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)\n  * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)\n  * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)\n  * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)\n  * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)\n  * firefox: thunderbird: Clipboard \"paste\" button persisted across tabs (CVE-2024-10465)\n  * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)\n  * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)\n  * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)\n  * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-01-30T02:22:03.101918Z","published":"2024-11-13T00:00:00Z","related":["CVE-2024-10458","CVE-2024-10459","CVE-2024-10460","CVE-2024-10461","CVE-2024-10462","CVE-2024-10463","CVE-2024-10464","CVE-2024-10465","CVE-2024-10466","CVE-2024-10467","CVE-2024-9680"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10459"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10460"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10461"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10462"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10463"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10464"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10465"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10466"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10467"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-9680"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2317442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322428"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322438"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322439"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322444"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2024-9552.html"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.4.0-1.el9_5.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:9552.json"}}],"schema_version":"1.7.3"}