Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.856527
Categoría:openSUSE Local Security Checks
Título:openSUSE Security Advisory (SUSE-SU-2024:3507-1)
Resumen:The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:3507-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:3507-1 advisory.

Vulnerability Insight:
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 128.2.3
MFSA 2024-43 (bsc#1229821)
* CVE-2024-8394: Crash when aborting verification of OTR chat.
* CVE-2024-8385: WASM type confusion involving ArrayTypes.
* CVE-2024-8381: Type confusion when looking up a property name in a 'with' block.
* CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks
ran.
* CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions.
* CVE-2024-8386: SelectElements could be shown over another site if popups are allowed.
* CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2.
MFSA 2024-37 (bsc#1228648)
* CVE-2024-7518: Fullscreen notification dialog can be obscured by document content.
* CVE-2024-7519: Out of bounds memory access in graphics shared memory handling.
* CVE-2024-7520: Type confusion in WebAssembly.
* CVE-2024-7521: Incomplete WebAssembly exception handing.
* CVE-2024-7522: Out of bounds read in editor component.
* CVE-2024-7525: Missing permission check when creating a StreamFilter.
* CVE-2024-7526: Uninitialized memory used by WebGL.
* CVE-2024-7527: Use-after-free in JavaScript garbage collection.
* CVE-2024-7528: Use-after-free in IndexedDB.
* CVE-2024-7529: Document content could partially obscure security prompts.
MFSA 2024-32 (bsc#1226316)
* CVE-2024-6606: Out-of-bounds read in clipboard component.
* CVE-2024-6607: Leaving pointerlock by pressing the escape key could be prevented.
* CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock.
* CVE-2024-6609: Memory corruption in NSS.
* CVE-2024-6610: Form validation popups could block exiting full-screen mode.
* CVE-2024-6600: Memory corruption in WebGL API.
* CVE-2024-6601: Race condition in permission assignment.
* CVE-2024-6602: Memory corruption in NSS.
* CVE-2024-6603: Memory corruption in thread creation.
* CVE-2024-6611: Incorrect handling of SameSite cookies.
* CVE-2024-6612: CSP violation leakage when using devtools.
* CVE-2024-6613: Incorrect listing of stack frames.
* CVE-2024-6614: Incorrect listing of stack frames.
* CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, Thunderbird 128, and Thunderbird
115.13.
* CVE-2024-6615: Memory safety bugs fixed in Firefox 128 and Thunderbird 128.

Bug fixes:
- Recommend libfido2-udev in order to try to get security keys (e.g. Yubikeys) working out of the box. (bsc#1184272)

Affected Software/OS:
'MozillaThunderbird' package(s) on openSUSE Leap 15.5, openSUSE Leap 15.6.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2024-6600
Common Vulnerability Exposure (CVE) ID: CVE-2024-6601
Common Vulnerability Exposure (CVE) ID: CVE-2024-6602
Common Vulnerability Exposure (CVE) ID: CVE-2024-6603
Common Vulnerability Exposure (CVE) ID: CVE-2024-6604
Common Vulnerability Exposure (CVE) ID: CVE-2024-6606
Common Vulnerability Exposure (CVE) ID: CVE-2024-6607
Common Vulnerability Exposure (CVE) ID: CVE-2024-6608
Common Vulnerability Exposure (CVE) ID: CVE-2024-6609
Common Vulnerability Exposure (CVE) ID: CVE-2024-6610
Common Vulnerability Exposure (CVE) ID: CVE-2024-6611
Common Vulnerability Exposure (CVE) ID: CVE-2024-6612
Common Vulnerability Exposure (CVE) ID: CVE-2024-6613
Common Vulnerability Exposure (CVE) ID: CVE-2024-6614
Common Vulnerability Exposure (CVE) ID: CVE-2024-6615
Common Vulnerability Exposure (CVE) ID: CVE-2024-7518
Common Vulnerability Exposure (CVE) ID: CVE-2024-7519
Common Vulnerability Exposure (CVE) ID: CVE-2024-7520
Common Vulnerability Exposure (CVE) ID: CVE-2024-7521
Common Vulnerability Exposure (CVE) ID: CVE-2024-7522
Common Vulnerability Exposure (CVE) ID: CVE-2024-7525
Common Vulnerability Exposure (CVE) ID: CVE-2024-7526
Common Vulnerability Exposure (CVE) ID: CVE-2024-7527
Common Vulnerability Exposure (CVE) ID: CVE-2024-7528
Common Vulnerability Exposure (CVE) ID: CVE-2024-7529
Common Vulnerability Exposure (CVE) ID: CVE-2024-8381
Common Vulnerability Exposure (CVE) ID: CVE-2024-8382
Common Vulnerability Exposure (CVE) ID: CVE-2024-8384
Common Vulnerability Exposure (CVE) ID: CVE-2024-8385
Common Vulnerability Exposure (CVE) ID: CVE-2024-8386
Common Vulnerability Exposure (CVE) ID: CVE-2024-8387
Common Vulnerability Exposure (CVE) ID: CVE-2024-8394
CopyrightCopyright (C) 2024 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.