Synopsis:          Important: thunderbird security update
Advisory ID:       SLSA-2021:5046-1
Issue Date:        2021-12-09
CVE Numbers:       CVE-2021-43536
                   CVE-2021-43537
                   CVE-2021-43538
                   CVE-2021-43539
                   CVE-2021-43541
                   CVE-2021-43542
                   CVE-2021-43543
                   CVE-2021-43545
                   CVE-2021-43546
                   CVE-2021-43528
--

This update upgrades Thunderbird to version 91.4.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4

* Mozilla: URL leakage when navigating while executing asynchronous
function (CVE-2021-43536)

* Mozilla: Heap buffer overflow when using structured clone
(CVE-2021-43537)

* Mozilla: Missing fullscreen and pointer lock notification when
requesting  both (CVE-2021-43538)

* Mozilla: GC rooting failure when calling wasm instance methods
(CVE-2021-43539)

* Mozilla: External protocol handler parameters were unescaped
(CVE-2021-43541)

* Mozilla: XMLHttpRequest error codes could have leaked the existence of
an  external protocol handler (CVE-2021-43542)

* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543)

* Mozilla: JavaScript unexpectedly enabled for the composition area
(CVE-2021-43528)

* Mozilla: Denial of Service when using the Location API in a loop
(CVE-2021-43545)

* Mozilla: Cursor spoofing could overlay user interface when native cursor
is zoomed (CVE-2021-43546)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

SL7
  x86_64
    thunderbird-91.4.0-3.el7_9.x86_64.rpm
    thunderbird-debuginfo-91.4.0-3.el7_9.x86_64.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2021-5046-1 Important: thunderbird on SL7.x x86_64

This update upgrades Thunderbird to version 91.4.0

Summary

Important: thunderbird security update



Security Fixes

* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
* Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536)
* Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537)
* Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538)
* Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539)
* Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541)
* Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542)
* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543)
* Mozilla: JavaScript unexpectedly enabled for the composition area (CVE-2021-43528)
* Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545)
* Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE
SL7 x86_64 thunderbird-91.4.0-3.el7_9.x86_64.rpm thunderbird-debuginfo-91.4.0-3.el7_9.x86_64.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2021:5046-1
Issued Date: : 2021-12-09
CVE Numbers: CVE-2021-43536
CVE-2021-43537
CVE-2021-43538

Related News