Bug 2325896 (CVE-2024-11159) - CVE-2024-11159 thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message
Summary: CVE-2024-11159 thunderbird: Potential disclosure of plaintext in OpenPGP encr...
Keywords:
Status: NEW
Alias: CVE-2024-11159
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-13 14:01 UTC by OSIDB Bzimport
Modified: 2024-12-03 12:21 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:10591 0 None None None 2024-12-02 01:52:01 UTC
Red Hat Product Errata RHSA-2024:10592 0 None None None 2024-12-02 01:24:11 UTC
Red Hat Product Errata RHSA-2024:10667 0 None None None 2024-12-02 11:40:48 UTC
Red Hat Product Errata RHSA-2024:10703 0 None None None 2024-12-02 17:13:59 UTC
Red Hat Product Errata RHSA-2024:10704 0 None None None 2024-12-02 17:15:08 UTC
Red Hat Product Errata RHSA-2024:10710 0 None None None 2024-12-02 18:56:56 UTC
Red Hat Product Errata RHSA-2024:10733 0 None None None 2024-12-03 01:44:26 UTC
Red Hat Product Errata RHSA-2024:10734 0 None None None 2024-12-03 06:30:38 UTC
Red Hat Product Errata RHSA-2024:10748 0 None None None 2024-12-03 12:21:59 UTC

Description OSIDB Bzimport 2024-11-13 14:01:05 UTC
Using remote content in OpenPGP encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird < 128.4.3 and Thunderbird < 132.0.1.

Comment 1 errata-xmlrpc 2024-12-02 01:24:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10592 https://access.redhat.com/errata/RHSA-2024:10592

Comment 2 errata-xmlrpc 2024-12-02 01:52:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:10591 https://access.redhat.com/errata/RHSA-2024:10591

Comment 3 errata-xmlrpc 2024-12-02 11:40:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:10667 https://access.redhat.com/errata/RHSA-2024:10667

Comment 4 errata-xmlrpc 2024-12-02 17:13:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:10703 https://access.redhat.com/errata/RHSA-2024:10703

Comment 5 errata-xmlrpc 2024-12-02 17:15:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:10704 https://access.redhat.com/errata/RHSA-2024:10704

Comment 6 errata-xmlrpc 2024-12-02 18:56:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:10710 https://access.redhat.com/errata/RHSA-2024:10710

Comment 7 errata-xmlrpc 2024-12-03 01:44:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:10733 https://access.redhat.com/errata/RHSA-2024:10733

Comment 8 errata-xmlrpc 2024-12-03 06:30:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:10734 https://access.redhat.com/errata/RHSA-2024:10734

Comment 9 errata-xmlrpc 2024-12-03 12:21:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2024:10748 https://access.redhat.com/errata/RHSA-2024:10748


Note You need to log in before you can comment on or make changes to this bug.