![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.856735 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (SUSE-SU-2024:4050-1) |
Summary: | The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:4050-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:4050-1 advisory. Vulnerability Insight: This update for MozillaThunderbird fixes the following issues: - Mozilla Thunderbird 128.4.3 * fixed: Folder corruption could cause Thunderbird to freeze and become unusable * fixed: Message corruption could be propagated when reading mbox * fixed: Folder compaction was not abandoned on shutdown * fixed: Folder compaction did not clean up on failure * fixed: Collapsed NNTP thread incorrectly indicated there were unread messages * fixed: Navigating to next unread message did not wait for all messages to be loaded * fixed: Applying column view to folder and children could break if folder error occurred * fixed: Remote content notifications were broken with encrypted messages * fixed: Updating criteria of a saved search resulted in poor search performance * fixed: Drop-downs may not work in some places * fixed: Security fixes MFSA 2024-61 (bsc#1233355) * CVE-2024-11159 Potential disclosure of plaintext in OpenPGP encrypted message - Mozilla Thunderbird 128.4.2 * changed: Increased the auto-compaction threshold to reduce frequency of compaction * fixed: New profile creation caused console errors * fixed: Repair folder could result in older messages showing wrong date and time * fixed: Recently deleted messages could become undeleted if message compaction failed * fixed: Visual and UX improvements * fixed: Clicking on an HTML button could cause Thunderbird to freeze * fixed: Messages could not be selected for dragging * fixed: Could not open attached file in a MIME encrypted message * fixed: Account creation 'Setup Documentation' link was broken * fixed: Unable to generate QR codes when exporting to mobile in some cases * fixed: Operating system reauthentication was missing when exporting QR codes for mobile * fixed: Could not drag all-day events from one day to another in week view - Mozilla Thunderbird 128.4.1 * new: Add the 20 year donation appeal - Mozilla Thunderbird 128.4 * new: Export Thunderbird account settings to Thunderbird Mobile via QRCode * fixed: Unable to send an unencrypted response to an OpenPGP encrypted message * fixed: Thunderbird update did not update language pack version until another restart * fixed: Security fixes MFSA 2024-58 (bsc#1231879) * CVE-2024-10458 Permission leak via embed or object elements * CVE-2024-10459 Use-after-free in layout with accessibility * CVE-2024-10460 Confusing display of origin for external protocol handler prompt * CVE-2024-10461 XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response * CVE-2024-10462 Origin of permission prompt could be spoofed by long URL * CVE-2024-10463 Cross origin video frame leak * CVE-2024-10464 History interface could have been used to cause a Denial of Service condition in the browser * CVE-2024-10465 Clipboard 'paste' button persisted across tabs * CVE-2024-10466 DOM push subscription message could hang ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'MozillaThunderbird' package(s) on openSUSE Leap 15.5, openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-10458 Common Vulnerability Exposure (CVE) ID: CVE-2024-10459 Common Vulnerability Exposure (CVE) ID: CVE-2024-10460 Common Vulnerability Exposure (CVE) ID: CVE-2024-10461 Common Vulnerability Exposure (CVE) ID: CVE-2024-10462 Common Vulnerability Exposure (CVE) ID: CVE-2024-10463 Common Vulnerability Exposure (CVE) ID: CVE-2024-10464 Common Vulnerability Exposure (CVE) ID: CVE-2024-10465 Common Vulnerability Exposure (CVE) ID: CVE-2024-10466 Common Vulnerability Exposure (CVE) ID: CVE-2024-10467 Common Vulnerability Exposure (CVE) ID: CVE-2024-11159 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |