Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.18.2.2024.0242.1
Category:openSUSE Local Security Checks
Title:openSUSE Security Advisory (SUSE-SU-2024:0242-1)
Summary:The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory.
Description:Summary:
The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory.

Vulnerability Insight:
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 115.7 (MFSA 2024-04) (bsc#1218955):

- CVE-2024-0741: Out of bounds write in ANGLE
- CVE-2024-0742: Failure to update user input timestamp
- CVE-2024-0746: Crash when listing printers on Linux
- CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set
- CVE-2024-0749: Phishing site popup could show local origin in address bar
- CVE-2024-0750: Potential permissions request bypass via clickjacking
- CVE-2024-0751: Privilege escalation through devtools
- CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain
- CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7

Other fixes:

* new: Autocrypt Gossip key distribution added (bmo#1853674)
* fixed: When starting Thunderbird, unread message count did
not appear on collapsed accounts (bmo#1862774)
* fixed: Blank window was sometimes displayed when starting
Thunderbird (bmo#1870817)
* fixed: Thunderbird '--chrome' flag incorrectly opened extra
messenger.xhtml (bmo#1866915)
* fixed: Add-ons did not start correctly when opening
Thunderbird from other programs (bmo#1800423)
* fixed: Drag-and-drop installation of add-ons did not work if
Add-ons Manager was opened from Unified Toolbar (bmo#1862978)
* fixed: Double-clicking empty space in message pane
incorrectly opened the currently selected message
(bmo#1867407)
* fixed: Canceling SMTP send before progress reached 100% did
not stop message from sending (bmo#1816540)
* fixed: PDF attachments open in a separate tab did not always
restore correctly after restarting Thunderbird (bmo#1846054)
* fixed: Some OpenPGP dialogs were too small for their contents
(bmo#1870809)
* fixed: Account Manager did not work with hostnames entered as
punycode (bmo#1870720,bmo#1872632)
* fixed: Downloading complete message from POP3 headers caused
message tab/window to close when 'Close message window/tab on
move or delete' was enabled (bmo#1861886)
* fixed: Some ECC GPG keys could not be exported (bmo#1867765)
* fixed: Contacts deleted from mailing list view still visible
in Details view (bmo#1799362)
* fixed: After selecting contacts in Address Book and starting
a new search, the search results list did not update
(bmo#1812726)
* fixed: Various UX and visual improvements (bmo#1866061,bmo#18
67169,bmo#1867728,bmo#1868079,bmo#1869519,bmo#1832149,bmo#185
6495,bmo#1861210,bmo#1861286,bmo#1863296,bmo#1864979)
* fixed: Security fixes

- Mozilla Thunderbird 115.6.1
* new: OAuth2 now supported for comcast.net (bmo#1844810)
* fixed: High CPU usage sometimes occurred with IMAP CONDSTORE
(conditional STORE) enabled (bmo#1839256)
* fixed: Replying to a collapsed thread via keyboard shortcut
(Ctrl+R/Cmd+R) opened a reply for every message in the thread
(bmo#1866819)
* fixed: Enabling ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'MozillaThunderbird' package(s) on openSUSE Leap 15.5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-0741
https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
https://www.mozilla.org/security/advisories/mfsa2024-01/
https://www.mozilla.org/security/advisories/mfsa2024-02/
https://www.mozilla.org/security/advisories/mfsa2024-04/
https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-0742
https://bugzilla.mozilla.org/show_bug.cgi?id=1867152
Common Vulnerability Exposure (CVE) ID: CVE-2024-0746
https://bugzilla.mozilla.org/show_bug.cgi?id=1660223
Common Vulnerability Exposure (CVE) ID: CVE-2024-0747
https://bugzilla.mozilla.org/show_bug.cgi?id=1764343
Common Vulnerability Exposure (CVE) ID: CVE-2024-0749
https://bugzilla.mozilla.org/show_bug.cgi?id=1813463
Common Vulnerability Exposure (CVE) ID: CVE-2024-0750
https://bugzilla.mozilla.org/show_bug.cgi?id=1863083
Common Vulnerability Exposure (CVE) ID: CVE-2024-0751
https://bugzilla.mozilla.org/show_bug.cgi?id=1865689
Common Vulnerability Exposure (CVE) ID: CVE-2024-0753
https://bugzilla.mozilla.org/show_bug.cgi?id=1870262
Common Vulnerability Exposure (CVE) ID: CVE-2024-0755
Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.