![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.18.2.2024.0242.1 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (SUSE-SU-2024:0242-1) |
Summary: | The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory. Vulnerability Insight: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 115.7 (MFSA 2024-04) (bsc#1218955): - CVE-2024-0741: Out of bounds write in ANGLE - CVE-2024-0742: Failure to update user input timestamp - CVE-2024-0746: Crash when listing printers on Linux - CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set - CVE-2024-0749: Phishing site popup could show local origin in address bar - CVE-2024-0750: Potential permissions request bypass via clickjacking - CVE-2024-0751: Privilege escalation through devtools - CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain - CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 Other fixes: * new: Autocrypt Gossip key distribution added (bmo#1853674) * fixed: When starting Thunderbird, unread message count did not appear on collapsed accounts (bmo#1862774) * fixed: Blank window was sometimes displayed when starting Thunderbird (bmo#1870817) * fixed: Thunderbird '--chrome' flag incorrectly opened extra messenger.xhtml (bmo#1866915) * fixed: Add-ons did not start correctly when opening Thunderbird from other programs (bmo#1800423) * fixed: Drag-and-drop installation of add-ons did not work if Add-ons Manager was opened from Unified Toolbar (bmo#1862978) * fixed: Double-clicking empty space in message pane incorrectly opened the currently selected message (bmo#1867407) * fixed: Canceling SMTP send before progress reached 100% did not stop message from sending (bmo#1816540) * fixed: PDF attachments open in a separate tab did not always restore correctly after restarting Thunderbird (bmo#1846054) * fixed: Some OpenPGP dialogs were too small for their contents (bmo#1870809) * fixed: Account Manager did not work with hostnames entered as punycode (bmo#1870720,bmo#1872632) * fixed: Downloading complete message from POP3 headers caused message tab/window to close when 'Close message window/tab on move or delete' was enabled (bmo#1861886) * fixed: Some ECC GPG keys could not be exported (bmo#1867765) * fixed: Contacts deleted from mailing list view still visible in Details view (bmo#1799362) * fixed: After selecting contacts in Address Book and starting a new search, the search results list did not update (bmo#1812726) * fixed: Various UX and visual improvements (bmo#1866061,bmo#18 67169,bmo#1867728,bmo#1868079,bmo#1869519,bmo#1832149,bmo#185 6495,bmo#1861210,bmo#1861286,bmo#1863296,bmo#1864979) * fixed: Security fixes - Mozilla Thunderbird 115.6.1 * new: OAuth2 now supported for comcast.net (bmo#1844810) * fixed: High CPU usage sometimes occurred with IMAP CONDSTORE (conditional STORE) enabled (bmo#1839256) * fixed: Replying to a collapsed thread via keyboard shortcut (Ctrl+R/Cmd+R) opened a reply for every message in the thread (bmo#1866819) * fixed: Enabling ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'MozillaThunderbird' package(s) on openSUSE Leap 15.5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-0741 https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 https://www.mozilla.org/security/advisories/mfsa2024-01/ https://www.mozilla.org/security/advisories/mfsa2024-02/ https://www.mozilla.org/security/advisories/mfsa2024-04/ https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2024-0742 https://bugzilla.mozilla.org/show_bug.cgi?id=1867152 Common Vulnerability Exposure (CVE) ID: CVE-2024-0746 https://bugzilla.mozilla.org/show_bug.cgi?id=1660223 Common Vulnerability Exposure (CVE) ID: CVE-2024-0747 https://bugzilla.mozilla.org/show_bug.cgi?id=1764343 Common Vulnerability Exposure (CVE) ID: CVE-2024-0749 https://bugzilla.mozilla.org/show_bug.cgi?id=1813463 Common Vulnerability Exposure (CVE) ID: CVE-2024-0750 https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 Common Vulnerability Exposure (CVE) ID: CVE-2024-0751 https://bugzilla.mozilla.org/show_bug.cgi?id=1865689 Common Vulnerability Exposure (CVE) ID: CVE-2024-0753 https://bugzilla.mozilla.org/show_bug.cgi?id=1870262 Common Vulnerability Exposure (CVE) ID: CVE-2024-0755 Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |