CVE-2024-9400 Affecting thunderbird package, versions <0:128.3.0-1.0.1.el9_4
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE9-THUNDERBIRD-8161974
- published 4 Oct 2024
- disclosed 1 Oct 2024
How to fix?
Upgrade Oracle:9
thunderbird
to version 0:128.3.0-1.0.1.el9_4 or higher.
This issue was patched in ELSA-2024-7552
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream thunderbird
package and not the thunderbird
package as distributed by Oracle
.
See How to fix?
for Oracle:9
relevant fixed versions and status.
A potential memory corruption vulnerability could be triggered if an attacker had the ability to trigger an OOM at a specific moment during JIT compilation. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
References
- https://linux.oracle.com/cve/CVE-2024-9400.html
- https://linux.oracle.com/errata/ELSA-2024-7552.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
- https://www.mozilla.org/security/advisories/mfsa2024-46/
- https://www.mozilla.org/security/advisories/mfsa2024-47/
- https://www.mozilla.org/security/advisories/mfsa2024-49/
- https://www.mozilla.org/security/advisories/mfsa2024-50/