RHSA-2024:9552

Vulnerability from csaf_redhat - Published: 2024-11-13 15:04 - Updated: 2026-03-18 02:47
Summary
Red Hat Security Advisory: thunderbird security update
Severity
Important
Notes
Topic: An update for thunderbird is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A remote code execution vulnerability was found in Firefox and Thunderbird. The Mozilla Foundation Security Advisories state: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines.

CWE-416 - Use After Free
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552
Workaround Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

The Mozilla Foundation's Security Advisory: A permission leak could occur from a trusted site to an untrusted site via `embed` or `object` elements.

CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

The Mozilla Foundation's Security Advisory: An attacker could cause a use-after-free when accessibility is enabled, leading to a potentially exploitable crash.

CWE-416 - Use After Free
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

The Mozilla Foundation's Security Advisory: The origin of an external protocol handler prompt could be obscured using a data: URL within an `iframe`.

CWE-940 - Improper Verification of Source of a Communication Channel
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

The Mozilla Foundation's Security Advisory: In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header is not respected and does not force a download, which could allow cross-site scripting (XSS) attacks.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

A flaw was found in Mozilla. The Mozilla Foundation's Security Advisory describes the following issue: Truncation of a long URL could have allowed origin spoofing in a permission prompt.

CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

A flaw was found in Mozilla. The Mozilla Foundation's Security Advisory describes the following issue: Video frames could have been leaked between origins in some situations.

CWE-942 - Permissive Cross-domain Security Policy with Untrusted Domains
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

The Mozilla Foundation's Security Advisory: Repeated writes to history interface attributes could be used to cause a Denial of Service condition in the browser. This issue was addressed by introducing rate-limiting to this API.

CWE-799 - Improper Control of Interaction Frequency
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

The Mozilla Foundation's Security Advisory: A clipboard "paste" button could persist across tabs which allowed a spoofing attack.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

The Mozilla Foundation's Security Advisory: By sending a specially crafted push message, a remote server could hang the parent process, causing the browser to become unresponsive.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552

A flaw was found in Mozilla. The Mozilla Foundation's Security Advisory describes the following issue: Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.

CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2024:9552
References
https://access.redhat.com/errata/RHSA-2024:9552 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=2317442 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322424 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322425 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322428 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322429 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322433 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322434 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322438 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322439 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322440 external
https://bugzilla.redhat.com/show_bug.cgi?id=2322444 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2024-9680 self
https://bugzilla.redhat.com/show_bug.cgi?id=2317442 external
https://www.cve.org/CVERecord?id=CVE-2024-9680 external
https://nvd.nist.gov/vuln/detail/CVE-2024-9680 external
https://www.mozilla.org/en-US/security/advisories… external
https://www.mozilla.org/en-US/security/advisories… external
https://www.cisa.gov/known-exploited-vulnerabilit… external
https://access.redhat.com/security/cve/CVE-2024-10458 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322428 external
https://www.cve.org/CVERecord?id=CVE-2024-10458 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10458 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1921733 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2024-10459 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322429 external
https://www.cve.org/CVERecord?id=CVE-2024-10459 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10459 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1919087 external
https://access.redhat.com/security/cve/CVE-2024-10460 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322444 external
https://www.cve.org/CVERecord?id=CVE-2024-10460 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10460 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1912537 external
https://access.redhat.com/security/cve/CVE-2024-10461 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322425 external
https://www.cve.org/CVERecord?id=CVE-2024-10461 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10461 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1914521 external
https://access.redhat.com/security/cve/CVE-2024-10462 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322440 external
https://www.cve.org/CVERecord?id=CVE-2024-10462 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10462 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1920423 external
https://access.redhat.com/security/cve/CVE-2024-10463 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322439 external
https://www.cve.org/CVERecord?id=CVE-2024-10463 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10463 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1920800 external
https://access.redhat.com/security/cve/CVE-2024-10464 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322424 external
https://www.cve.org/CVERecord?id=CVE-2024-10464 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10464 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1913000 external
https://access.redhat.com/security/cve/CVE-2024-10465 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322434 external
https://www.cve.org/CVERecord?id=CVE-2024-10465 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10465 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1918853 external
https://access.redhat.com/security/cve/CVE-2024-10466 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322438 external
https://www.cve.org/CVERecord?id=CVE-2024-10466 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10466 external
https://bugzilla.mozilla.org/show_bug.cgi?id=1924154 external
https://access.redhat.com/security/cve/CVE-2024-10467 self
https://bugzilla.redhat.com/show_bug.cgi?id=2322433 external
https://www.cve.org/CVERecord?id=CVE-2024-10467 external
https://nvd.nist.gov/vuln/detail/CVE-2024-10467 external
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1… external
Acknowledgments
ESET Damien Schaeffer

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSecurity Fix(es):\n\n* firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)\n\n* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)\n\n* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)\n\n* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)\n\n* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)\n\n* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)\n\n* firefox: thunderbird: Clipboard \"paste\" button persisted across tabs (CVE-2024-10465)\n\n* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)\n\n* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)\n\n* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)\n\n* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9552",
        "url": "https://access.redhat.com/errata/RHSA-2024:9552"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2317442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317442"
      },
      {
        "category": "external",
        "summary": "2322424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322424"
      },
      {
        "category": "external",
        "summary": "2322425",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322425"
      },
      {
        "category": "external",
        "summary": "2322428",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322428"
      },
      {
        "category": "external",
        "summary": "2322429",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322429"
      },
      {
        "category": "external",
        "summary": "2322433",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322433"
      },
      {
        "category": "external",
        "summary": "2322434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322434"
      },
      {
        "category": "external",
        "summary": "2322438",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322438"
      },
      {
        "category": "external",
        "summary": "2322439",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322439"
      },
      {
        "category": "external",
        "summary": "2322440",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322440"
      },
      {
        "category": "external",
        "summary": "2322444",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322444"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9552.json"
      }
    ],
    "title": "Red Hat Security Advisory: thunderbird security update",
    "tracking": {
      "current_release_date": "2026-03-18T02:47:34+00:00",
      "generator": {
        "date": "2026-03-18T02:47:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.3"
        }
      },
      "id": "RHSA-2024:9552",
      "initial_release_date": "2024-11-13T15:04:53+00:00",
      "revision_history": [
        {
          "date": "2024-11-13T15:04:53+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-13T15:04:53+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-03-18T02:47:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "thunderbird-0:128.4.0-1.el9_5.src",
                "product": {
                  "name": "thunderbird-0:128.4.0-1.el9_5.src",
                  "product_id": "thunderbird-0:128.4.0-1.el9_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird@128.4.0-1.el9_5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "thunderbird-0:128.4.0-1.el9_5.aarch64",
                "product": {
                  "name": "thunderbird-0:128.4.0-1.el9_5.aarch64",
                  "product_id": "thunderbird-0:128.4.0-1.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird@128.4.0-1.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
                "product": {
                  "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
                  "product_id": "thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debugsource@128.4.0-1.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
                "product": {
                  "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
                  "product_id": "thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debuginfo@128.4.0-1.el9_5?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "thunderbird-0:128.4.0-1.el9_5.ppc64le",
                "product": {
                  "name": "thunderbird-0:128.4.0-1.el9_5.ppc64le",
                  "product_id": "thunderbird-0:128.4.0-1.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird@128.4.0-1.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
                "product": {
                  "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
                  "product_id": "thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debugsource@128.4.0-1.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
                "product": {
                  "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
                  "product_id": "thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debuginfo@128.4.0-1.el9_5?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "thunderbird-0:128.4.0-1.el9_5.x86_64",
                "product": {
                  "name": "thunderbird-0:128.4.0-1.el9_5.x86_64",
                  "product_id": "thunderbird-0:128.4.0-1.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird@128.4.0-1.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64",
                "product": {
                  "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64",
                  "product_id": "thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debugsource@128.4.0-1.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
                "product": {
                  "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
                  "product_id": "thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debuginfo@128.4.0-1.el9_5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "thunderbird-0:128.4.0-1.el9_5.s390x",
                "product": {
                  "name": "thunderbird-0:128.4.0-1.el9_5.s390x",
                  "product_id": "thunderbird-0:128.4.0-1.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird@128.4.0-1.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
                "product": {
                  "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
                  "product_id": "thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debugsource@128.4.0-1.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
                "product": {
                  "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
                  "product_id": "thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/thunderbird-debuginfo@128.4.0-1.el9_5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-0:128.4.0-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64"
        },
        "product_reference": "thunderbird-0:128.4.0-1.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-0:128.4.0-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le"
        },
        "product_reference": "thunderbird-0:128.4.0-1.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-0:128.4.0-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x"
        },
        "product_reference": "thunderbird-0:128.4.0-1.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-0:128.4.0-1.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src"
        },
        "product_reference": "thunderbird-0:128.4.0-1.el9_5.src",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-0:128.4.0-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64"
        },
        "product_reference": "thunderbird-0:128.4.0-1.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64"
        },
        "product_reference": "thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le"
        },
        "product_reference": "thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x"
        },
        "product_reference": "thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64"
        },
        "product_reference": "thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64"
        },
        "product_reference": "thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le"
        },
        "product_reference": "thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x"
        },
        "product_reference": "thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        },
        "product_reference": "thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Damien Schaeffer"
          ],
          "organization": "ESET"
        }
      ],
      "cve": "CVE-2024-9680",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-10-08T22:48:09.324000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2317442"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A remote code execution vulnerability was found in Firefox and Thunderbird. The Mozilla Foundation Security Advisories state: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Mozilla Foundation Security Advisory indicates that this vulnerability is being exploited in the wild.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-9680"
        },
        {
          "category": "external",
          "summary": "RHBZ#2317442",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317442"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9680",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-9680"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9680",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9680"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-52/",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-52/"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2024-10-09T14:08:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2024-10-15T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)"
    },
    {
      "cve": "CVE-2024-10458",
      "cwe": {
        "id": "CWE-280",
        "name": "Improper Handling of Insufficient Permissions or Privileges "
      },
      "discovery_date": "2024-10-29T13:01:09.953331+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322428"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: A permission leak could occur from a trusted site to an untrusted site via `embed` or `object` elements.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Permission leak via embed or object elements",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322428",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322428"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10458"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921733",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921733"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-57/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:08.505000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Permission leak via embed or object elements"
    },
    {
      "cve": "CVE-2024-10459",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-10-29T13:01:13.692590+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322429"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: An attacker could cause a use-after-free when accessibility is enabled, leading to a potentially exploitable crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Use-after-free in layout with accessibility",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10459"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322429",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322429"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10459",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10459",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10459"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1919087",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1919087"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-57/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:09.637000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Use-after-free in layout with accessibility"
    },
    {
      "cve": "CVE-2024-10460",
      "cwe": {
        "id": "CWE-940",
        "name": "Improper Verification of Source of a Communication Channel"
      },
      "discovery_date": "2024-10-29T13:02:21.278311+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322444"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: The origin of an external protocol handler prompt could be obscured using a data: URL within an `iframe`.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Confusing display of origin for external protocol handler prompt",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10460"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322444",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322444"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10460",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10460",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10460"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912537",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912537"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:10.679000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Confusing display of origin for external protocol handler prompt"
    },
    {
      "cve": "CVE-2024-10461",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2024-10-29T13:00:54.481463+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322425"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header is not respected and does not force a download, which could allow cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322425",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322425"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10461"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914521",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914521"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:11.706000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response"
    },
    {
      "cve": "CVE-2024-10462",
      "cwe": {
        "id": "CWE-280",
        "name": "Improper Handling of Insufficient Permissions or Privileges "
      },
      "discovery_date": "2024-10-29T13:02:03.508898+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322440"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation\u0027s Security Advisory describes the following issue: Truncation of a long URL could have allowed origin spoofing in a permission prompt.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Origin of permission prompt could be spoofed by long URL",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322440",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322440"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10462"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920423",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920423"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:12.782000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Origin of permission prompt could be spoofed by long URL"
    },
    {
      "cve": "CVE-2024-10463",
      "cwe": {
        "id": "CWE-942",
        "name": "Permissive Cross-domain Security Policy with Untrusted Domains"
      },
      "discovery_date": "2024-10-29T13:01:59.432588+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322439"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation\u0027s Security Advisory describes the following issue: Video frames could have been leaked between origins in some situations.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Cross origin video frame leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10463"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322439",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322439"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10463",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10463",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10463"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920800",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920800"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-57/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:13.795000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Cross origin video frame leak"
    },
    {
      "cve": "CVE-2024-10464",
      "cwe": {
        "id": "CWE-799",
        "name": "Improper Control of Interaction Frequency"
      },
      "discovery_date": "2024-10-29T13:00:50.493767+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: Repeated writes to history interface attributes could be used to cause a Denial of Service condition in the browser. This issue was addressed by introducing rate-limiting to this API.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10464"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10464",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10464",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10464"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1913000",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1913000"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:14.864000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser"
    },
    {
      "cve": "CVE-2024-10465",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2024-10-29T13:01:35.924444+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322434"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: A clipboard \"paste\" button could persist across tabs which allowed a spoofing attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Clipboard \"paste\" button persisted across tabs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10465"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322434",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322434"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10465",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10465",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10465"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918853",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918853"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:15.936000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "firefox: thunderbird: Clipboard \"paste\" button persisted across tabs"
    },
    {
      "cve": "CVE-2024-10466",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-10-29T13:01:54.109279+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322438"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Mozilla Foundation\u0027s Security Advisory: By sending a specially crafted push message, a remote server could hang the parent process, causing the browser to become unresponsive.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: DOM push subscription message could hang Firefox",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10466"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322438",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322438"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10466",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10466",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10466"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154",
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:17.005000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "firefox: DOM push subscription message could hang Firefox"
    },
    {
      "cve": "CVE-2024-10467",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2024-10-29T13:01:32.558533+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2322433"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation\u0027s Security Advisory describes the following issue: Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10467"
        },
        {
          "category": "external",
          "summary": "RHBZ#2322433",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322433"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10467",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10467",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10467"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706",
          "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
          "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/"
        }
      ],
      "release_date": "2024-10-29T12:19:18.057000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-13T15:04:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9552"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:thunderbird-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debuginfo-0:128.4.0-1.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:thunderbird-debugsource-0:128.4.0-1.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…