Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in thunderbird
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in thunderbird
ID: RHSA-2024:4894
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux AppStream TUS (v.8.6), Red Hat Enterprise Linux AppStream AUS (v.8.6), Red Hat Enterprise Linux AppStream E4S (v.8.6)
Datum: Mo, 29. Juli 2024, 22:12
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2296637
https://bugzilla.redhat.com/show_bug.cgi?id=2296636
https://access.redhat.com/security/cve/CVE-2024-6602
https://bugzilla.redhat.com/show_bug.cgi?id=2296639
https://access.redhat.com/security/cve/CVE-2024-6604
https://access.redhat.com/errata/RHSA-2024:4894
https://access.redhat.com/security/cve/CVE-2024-6601
https://access.redhat.com/security/cve/CVE-2024-6603
https://bugzilla.redhat.com/show_bug.cgi?id=2296638
Applikationen: Mozilla Thunderbird

Originalnachricht

An update for thunderbird is now available for Red Hat Enterprise Linux 8.6
Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Security Fix(es):

* Mozilla: Race condition in permission assignment (CVE-2024-6601)

* Mozilla: Memory corruption in NSS (CVE-2024-6602)

* Mozilla: Memory corruption in thread creation (CVE-2024-6603)

* Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and
Thunderbird 115.13 (CVE-2024-6604)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2024-6601: Improper Preservation of Permissions (CWE-281)
CVE-2024-6602: Improper Restriction of Operations within the Bounds of a Memory
Buffer (CWE-119)
CVE-2024-6603: Improper Restriction of Operations within the Bounds of a Memory
Buffer (CWE-119)
CVE-2024-6604: Buffer Copy without Checking Size of Input ('Classic Buffer
Overflow') (CWE-120)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung