Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.18.2.2024.0242.1
Categoría:openSUSE Local Security Checks
Título:openSUSE Security Advisory (SUSE-SU-2024:0242-1)
Resumen:The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:0242-1 advisory.

Vulnerability Insight:
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 115.7 (MFSA 2024-04) (bsc#1218955):

- CVE-2024-0741: Out of bounds write in ANGLE
- CVE-2024-0742: Failure to update user input timestamp
- CVE-2024-0746: Crash when listing printers on Linux
- CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set
- CVE-2024-0749: Phishing site popup could show local origin in address bar
- CVE-2024-0750: Potential permissions request bypass via clickjacking
- CVE-2024-0751: Privilege escalation through devtools
- CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain
- CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7

Other fixes:

* new: Autocrypt Gossip key distribution added (bmo#1853674)
* fixed: When starting Thunderbird, unread message count did
not appear on collapsed accounts (bmo#1862774)
* fixed: Blank window was sometimes displayed when starting
Thunderbird (bmo#1870817)
* fixed: Thunderbird '--chrome' flag incorrectly opened extra
messenger.xhtml (bmo#1866915)
* fixed: Add-ons did not start correctly when opening
Thunderbird from other programs (bmo#1800423)
* fixed: Drag-and-drop installation of add-ons did not work if
Add-ons Manager was opened from Unified Toolbar (bmo#1862978)
* fixed: Double-clicking empty space in message pane
incorrectly opened the currently selected message
(bmo#1867407)
* fixed: Canceling SMTP send before progress reached 100% did
not stop message from sending (bmo#1816540)
* fixed: PDF attachments open in a separate tab did not always
restore correctly after restarting Thunderbird (bmo#1846054)
* fixed: Some OpenPGP dialogs were too small for their contents
(bmo#1870809)
* fixed: Account Manager did not work with hostnames entered as
punycode (bmo#1870720,bmo#1872632)
* fixed: Downloading complete message from POP3 headers caused
message tab/window to close when 'Close message window/tab on
move or delete' was enabled (bmo#1861886)
* fixed: Some ECC GPG keys could not be exported (bmo#1867765)
* fixed: Contacts deleted from mailing list view still visible
in Details view (bmo#1799362)
* fixed: After selecting contacts in Address Book and starting
a new search, the search results list did not update
(bmo#1812726)
* fixed: Various UX and visual improvements (bmo#1866061,bmo#18
67169,bmo#1867728,bmo#1868079,bmo#1869519,bmo#1832149,bmo#185
6495,bmo#1861210,bmo#1861286,bmo#1863296,bmo#1864979)
* fixed: Security fixes

- Mozilla Thunderbird 115.6.1
* new: OAuth2 now supported for comcast.net (bmo#1844810)
* fixed: High CPU usage sometimes occurred with IMAP CONDSTORE
(conditional STORE) enabled (bmo#1839256)
* fixed: Replying to a collapsed thread via keyboard shortcut
(Ctrl+R/Cmd+R) opened a reply for every message in the thread
(bmo#1866819)
* fixed: Enabling ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'MozillaThunderbird' package(s) on openSUSE Leap 15.5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2024-0741
https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
https://www.mozilla.org/security/advisories/mfsa2024-01/
https://www.mozilla.org/security/advisories/mfsa2024-02/
https://www.mozilla.org/security/advisories/mfsa2024-04/
https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-0742
https://bugzilla.mozilla.org/show_bug.cgi?id=1867152
Common Vulnerability Exposure (CVE) ID: CVE-2024-0746
https://bugzilla.mozilla.org/show_bug.cgi?id=1660223
Common Vulnerability Exposure (CVE) ID: CVE-2024-0747
https://bugzilla.mozilla.org/show_bug.cgi?id=1764343
Common Vulnerability Exposure (CVE) ID: CVE-2024-0749
https://bugzilla.mozilla.org/show_bug.cgi?id=1813463
Common Vulnerability Exposure (CVE) ID: CVE-2024-0750
https://bugzilla.mozilla.org/show_bug.cgi?id=1863083
Common Vulnerability Exposure (CVE) ID: CVE-2024-0751
https://bugzilla.mozilla.org/show_bug.cgi?id=1865689
Common Vulnerability Exposure (CVE) ID: CVE-2024-0753
https://bugzilla.mozilla.org/show_bug.cgi?id=1870262
Common Vulnerability Exposure (CVE) ID: CVE-2024-0755
Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701
CopyrightCopyright (C) 2025 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.