drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in thunderbird
Name: |
Mehrere Probleme in thunderbird |
|
ID: |
RHSA-2021:3839-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Mi, 13. Oktober 2021, 13:09 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2021-38501
https://access.redhat.com/security/cve/CVE-2021-38498
https://access.redhat.com/security/cve/CVE-2021-38497
https://access.redhat.com/security/cve/CVE-2021-32810
https://access.redhat.com/security/cve/CVE-2021-38502
https://access.redhat.com/security/cve/CVE-2021-38500
https://access.redhat.com/security/cve/CVE-2021-38496 |
|
Applikationen: |
Mozilla Thunderbird |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: thunderbird security update Advisory ID: RHSA-2021:3839-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3839 Issue date: 2021-10-13 CVE Names: CVE-2021-32810 CVE-2021-38496 CVE-2021-38497 CVE-2021-38498 CVE-2021-38500 CVE-2021-38501 CVE-2021-38502 =====================================================================
1. Summary:
An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, ppc64le, x86_64
3. Description:
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 91.2.0.
Security Fix(es):
* Mozilla: Use-after-free in MessageTask (CVE-2021-38496)
* Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500)
* Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501)
* Mozilla: Downgrade attack on SMTP STARTTLS connections (CVE-2021-38502)
* rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810)
* Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497)
* Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of Thunderbird must be restarted for the update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1990342 - CVE-2021-32810 rust-crossbeam-deque: race condition may lead to double free 2011097 - CVE-2021-38496 Mozilla: Use-after-free in MessageTask 2011098 - CVE-2021-38497 Mozilla: Validation message could have been overlaid on another origin 2011099 - CVE-2021-38498 Mozilla: Use-after-free of nsLanguageAtomService object 2011100 - CVE-2021-38500 Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 2011101 - CVE-2021-38501 Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 2013469 - CVE-2021-38502 Mozilla: Downgrade attack on SMTP STARTTLS connections
6. Package List:
Red Hat Enterprise Linux AppStream EUS (v. 8.2):
Source: thunderbird-91.2.0-1.el8_2.src.rpm
aarch64: thunderbird-91.2.0-1.el8_2.aarch64.rpm thunderbird-debuginfo-91.2.0-1.el8_2.aarch64.rpm thunderbird-debugsource-91.2.0-1.el8_2.aarch64.rpm
ppc64le: thunderbird-91.2.0-1.el8_2.ppc64le.rpm thunderbird-debuginfo-91.2.0-1.el8_2.ppc64le.rpm thunderbird-debugsource-91.2.0-1.el8_2.ppc64le.rpm
x86_64: thunderbird-91.2.0-1.el8_2.x86_64.rpm thunderbird-debuginfo-91.2.0-1.el8_2.x86_64.rpm thunderbird-debugsource-91.2.0-1.el8_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-32810 https://access.redhat.com/security/cve/CVE-2021-38496 https://access.redhat.com/security/cve/CVE-2021-38497 https://access.redhat.com/security/cve/CVE-2021-38498 https://access.redhat.com/security/cve/CVE-2021-38500 https://access.redhat.com/security/cve/CVE-2021-38501 https://access.redhat.com/security/cve/CVE-2021-38502 https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYWam6NzjgjWX9erEAQhP7RAAl+2nhF5jf49AWDmtjdlFUataUsgxlclU x4UAyTvrWb5e7GQ+gzGlaYNRBrz+lbEo7Ei2TkbAZ+uB4sa7gZfONxSyI6kw4cHA QTBC3KD08JBPH+1YDN9pQ64MzTM6D55rIvXPR3jnQiVn1kb/G4w3ygjixlqV8JYd yEX8JlfxHJh8m2V1rPPd5T+5dPRRE+8IMSxKW9tMuBgAB7wUkJYErzA/Q4lKMVzb yXKG1Bu3DheZaCxpcBUFGfyJuCsj2Ehu2rC/pIzBFJHxPOxvTSVQCKoTjb4AVplb YSU7d+r1U0j4iqZjssSDoVHL6qTDGTqKmYIgQ5YaUdkpaWv4FhL4mPiOqcntb1uQ JOpJcti8C5kPU08xi70CGLGd/Djb5oKZN38RNbVyjHh97aEHf+sc3xBiykfbYkRE UZZ+sMRnimeuUqGv0YW7KwSEF7K77f4r2YaQuzUvFoekfuOAgdYLbGohKMB/0Fio HCFAgB3qGf0xRUafOE29HGoHgXiDdufVQwiu52A21KG20IcyuNWVS34tft486Qrj Gx9RGSZJ3r30MY/uQFdu5u/ZiQrwHQuK9DTTOHO4DZ8qxWn1ZnW5Z8UvArhWde3Q 89V7vBkPMlqUNNXvoyd4S5tW53X5uwlVdVVE2f5e86zJjaoPtc8xGL2yeEtrMzzT 2CuqEsGV68s= =S3K2 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|