Lucene search

K
redhatRedHatRHSA-2024:0623
HistoryJan 30, 2024 - 3:54 p.m.

(RHSA-2024:0623) Important: thunderbird security update

2024-01-3015:54:31
access.redhat.com
8
mozilla thunderbird
standalone client
security update
version 115.7.0
out of bounds write
update failure
crash
content security policy
phishing site popup
clickjacking bypass
privilege escalation
hsts policy bypass
memory safety bugs
cve-2024-0741
cve-2024-0742
cve-2024-0746
cve-2024-0747
cve-2024-0749
cve-2024-0750
cve-2024-0751
cve-2024-0753
cve-2024-0755

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.0%

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.7.0.

Security Fix(es):

  • Mozilla: Out of bounds write in ANGLE (CVE-2024-0741)

  • Mozilla: Failure to update user input timestamp (CVE-2024-0742)

  • Mozilla: Crash when listing printers on Linux (CVE-2024-0746)

  • Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747)

  • Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749)

  • Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750)

  • Mozilla: Privilege escalation through devtools (CVE-2024-0751)

  • Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753)

  • Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.