When aborting the verification of an OTR chat session, an attacker could have caused a use-after-free bug leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 128.2.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:6684 https://access.redhat.com/errata/RHSA-2024:6684
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:6683 https://access.redhat.com/errata/RHSA-2024:6683
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:6722 https://access.redhat.com/errata/RHSA-2024:6722
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:6720 https://access.redhat.com/errata/RHSA-2024:6720
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:6723 https://access.redhat.com/errata/RHSA-2024:6723
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:6721 https://access.redhat.com/errata/RHSA-2024:6721
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:6719 https://access.redhat.com/errata/RHSA-2024:6719
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:6816 https://access.redhat.com/errata/RHSA-2024:6816