![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.18.2.2024.0242.1 |
Categoría: | openSUSE Local Security Checks |
Título: | openSUSE Security Advisory (SUSE-SU-2024:0242-1) |
Resumen: | The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory. Vulnerability Insight: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 115.7 (MFSA 2024-04) (bsc#1218955): - CVE-2024-0741: Out of bounds write in ANGLE - CVE-2024-0742: Failure to update user input timestamp - CVE-2024-0746: Crash when listing printers on Linux - CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set - CVE-2024-0749: Phishing site popup could show local origin in address bar - CVE-2024-0750: Potential permissions request bypass via clickjacking - CVE-2024-0751: Privilege escalation through devtools - CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain - CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 Other fixes: * new: Autocrypt Gossip key distribution added (bmo#1853674) * fixed: When starting Thunderbird, unread message count did not appear on collapsed accounts (bmo#1862774) * fixed: Blank window was sometimes displayed when starting Thunderbird (bmo#1870817) * fixed: Thunderbird '--chrome' flag incorrectly opened extra messenger.xhtml (bmo#1866915) * fixed: Add-ons did not start correctly when opening Thunderbird from other programs (bmo#1800423) * fixed: Drag-and-drop installation of add-ons did not work if Add-ons Manager was opened from Unified Toolbar (bmo#1862978) * fixed: Double-clicking empty space in message pane incorrectly opened the currently selected message (bmo#1867407) * fixed: Canceling SMTP send before progress reached 100% did not stop message from sending (bmo#1816540) * fixed: PDF attachments open in a separate tab did not always restore correctly after restarting Thunderbird (bmo#1846054) * fixed: Some OpenPGP dialogs were too small for their contents (bmo#1870809) * fixed: Account Manager did not work with hostnames entered as punycode (bmo#1870720,bmo#1872632) * fixed: Downloading complete message from POP3 headers caused message tab/window to close when 'Close message window/tab on move or delete' was enabled (bmo#1861886) * fixed: Some ECC GPG keys could not be exported (bmo#1867765) * fixed: Contacts deleted from mailing list view still visible in Details view (bmo#1799362) * fixed: After selecting contacts in Address Book and starting a new search, the search results list did not update (bmo#1812726) * fixed: Various UX and visual improvements (bmo#1866061,bmo#18 67169,bmo#1867728,bmo#1868079,bmo#1869519,bmo#1832149,bmo#185 6495,bmo#1861210,bmo#1861286,bmo#1863296,bmo#1864979) * fixed: Security fixes - Mozilla Thunderbird 115.6.1 * new: OAuth2 now supported for comcast.net (bmo#1844810) * fixed: High CPU usage sometimes occurred with IMAP CONDSTORE (conditional STORE) enabled (bmo#1839256) * fixed: Replying to a collapsed thread via keyboard shortcut (Ctrl+R/Cmd+R) opened a reply for every message in the thread (bmo#1866819) * fixed: Enabling ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'MozillaThunderbird' package(s) on openSUSE Leap 15.5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-0741 https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 https://www.mozilla.org/security/advisories/mfsa2024-01/ https://www.mozilla.org/security/advisories/mfsa2024-02/ https://www.mozilla.org/security/advisories/mfsa2024-04/ https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2024-0742 https://bugzilla.mozilla.org/show_bug.cgi?id=1867152 Common Vulnerability Exposure (CVE) ID: CVE-2024-0746 https://bugzilla.mozilla.org/show_bug.cgi?id=1660223 Common Vulnerability Exposure (CVE) ID: CVE-2024-0747 https://bugzilla.mozilla.org/show_bug.cgi?id=1764343 Common Vulnerability Exposure (CVE) ID: CVE-2024-0749 https://bugzilla.mozilla.org/show_bug.cgi?id=1813463 Common Vulnerability Exposure (CVE) ID: CVE-2024-0750 https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 Common Vulnerability Exposure (CVE) ID: CVE-2024-0751 https://bugzilla.mozilla.org/show_bug.cgi?id=1865689 Common Vulnerability Exposure (CVE) ID: CVE-2024-0753 https://bugzilla.mozilla.org/show_bug.cgi?id=1870262 Common Vulnerability Exposure (CVE) ID: CVE-2024-0755 Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 |
Copyright | Copyright (C) 2025 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |