From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 620A31581C1 for ; Sat, 6 Jul 2024 06:16:05 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 31BB72BC117; Sat, 6 Jul 2024 06:15:31 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 1A0B12BC0FC for ; Sat, 6 Jul 2024 06:15:09 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.165]) by smtp.gentoo.org (Postfix) with ESMTP id 8CB9A335DC5 for ; Sat, 6 Jul 2024 06:15:08 +0000 (UTC) Received: from [172.18.0.3] (unknown [172.18.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id 5B21BB6E4D for ; Sat, 6 Jul 2024 06:15:08 +0000 (UTC) Subject: [gentoo-announce] [ GLSA 202407-19 ] Mozilla Thunderbird: Multiple Vulnerabilities Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============4348320824058112062==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Sat, 06 Jul 2024 06:15:08 -0000 Message-ID: <172024650836.7.6886926683011256504@3f85d36892cf> X-Archives-Salt: 046dc449-fc7b-4d43-9269-1bdf90a963db X-Archives-Hash: a986b6b5d2ab745f54e7d89b54b592ed --===============4348320824058112062== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202407-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Mozilla Thunderbird: Multiple Vulnerabilities Date: July 06, 2024 Bugs: #932375 ID: 202407-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. Background ========== Mozilla Thunderbird is a popular open-source email client from the Mozilla project. Affected packages ================= Package Vulnerable Unaffected --------------------------- ------------ ------------ mail-client/thunderbird < 115.11.0 >= 115.11.0 mail-client/thunderbird-bin < 115.11.0 >= 115.11.0 Description =========== Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Thunderbird binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-115.11.0" All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-115.11.0" References ========== [ 1 ] CVE-2024-2609 https://nvd.nist.gov/vuln/detail/CVE-2024-2609 [ 2 ] CVE-2024-3302 https://nvd.nist.gov/vuln/detail/CVE-2024-3302 [ 3 ] CVE-2024-3854 https://nvd.nist.gov/vuln/detail/CVE-2024-3854 [ 4 ] CVE-2024-3857 https://nvd.nist.gov/vuln/detail/CVE-2024-3857 [ 5 ] CVE-2024-3859 https://nvd.nist.gov/vuln/detail/CVE-2024-3859 [ 6 ] CVE-2024-3861 https://nvd.nist.gov/vuln/detail/CVE-2024-3861 [ 7 ] CVE-2024-3864 https://nvd.nist.gov/vuln/detail/CVE-2024-3864 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202407-19 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============4348320824058112062== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmaI4OwACgkQFMQkOaVy +9mSPA//WlyG64honIT9V1zothF8TA9ZDlk7SHM5JBLjjrNhrkOtWgLfHbcGFQWZ 1WheXmpiQvGN1QTyr9hUTerVpYniDJz6UQAeoo5hR2lD9hjjCCEAlPvTzndJqfpt SIBxPrd8GVv/tQwYmhd3/hFpjhy1QfBs10MbeBdSWFJ5NyEOTTcqfDsSj3bu+kUL Q+HQ/83EM2EsvGKUKd03vP0L6o091piCmGkFeW+/4XYanW1LPq1fFifoI+vVTf50 VeMT3rfA0iae5XhPj9WiXe7u1T9EYhPPxQX7JrQJ9lZ3L3R2amyBw4rcehfAURmY 07QXwZ7Lm0iVHeeLd0p5UxSZHzGAUzUns4IPuF2MxwU5Bq80hQgD7OL2YaFYAGuf E03swraZL1cy5CuG3KW+TA89BTqQGn9t74JhAF1CQM0VxaZhnmqp2DJO9IlRhMYz RwfVhhZrkUNTBy37Tut8qLF0ECagEo5xo3l4HD7S8helTwYGHqtpJDUaPLs9paed phx+JKYWOLMyDltgVVWCOkNZmTH8pJHrQG4rLv9GFbglu488uN04HK2n0nmZ66s8 tLa//vliEJC9oUvPiU8P79dm4AUG6BBm9+epgV9MO2oMCKgQoTOoizaioLQ3m02g lXphAYd9QlC6IZYwlBRxe3uYkQTTzcTsrqNkBZYZtn39IaJi86A= =dH++ -----END PGP SIGNATURE----- --===============4348320824058112062==--