![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.856735 |
Kategorie: | openSUSE Local Security Checks |
Titel: | openSUSE Security Advisory (SUSE-SU-2024:4050-1) |
Zusammenfassung: | The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:4050-1 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:4050-1 advisory. Vulnerability Insight: This update for MozillaThunderbird fixes the following issues: - Mozilla Thunderbird 128.4.3 * fixed: Folder corruption could cause Thunderbird to freeze and become unusable * fixed: Message corruption could be propagated when reading mbox * fixed: Folder compaction was not abandoned on shutdown * fixed: Folder compaction did not clean up on failure * fixed: Collapsed NNTP thread incorrectly indicated there were unread messages * fixed: Navigating to next unread message did not wait for all messages to be loaded * fixed: Applying column view to folder and children could break if folder error occurred * fixed: Remote content notifications were broken with encrypted messages * fixed: Updating criteria of a saved search resulted in poor search performance * fixed: Drop-downs may not work in some places * fixed: Security fixes MFSA 2024-61 (bsc#1233355) * CVE-2024-11159 Potential disclosure of plaintext in OpenPGP encrypted message - Mozilla Thunderbird 128.4.2 * changed: Increased the auto-compaction threshold to reduce frequency of compaction * fixed: New profile creation caused console errors * fixed: Repair folder could result in older messages showing wrong date and time * fixed: Recently deleted messages could become undeleted if message compaction failed * fixed: Visual and UX improvements * fixed: Clicking on an HTML button could cause Thunderbird to freeze * fixed: Messages could not be selected for dragging * fixed: Could not open attached file in a MIME encrypted message * fixed: Account creation 'Setup Documentation' link was broken * fixed: Unable to generate QR codes when exporting to mobile in some cases * fixed: Operating system reauthentication was missing when exporting QR codes for mobile * fixed: Could not drag all-day events from one day to another in week view - Mozilla Thunderbird 128.4.1 * new: Add the 20 year donation appeal - Mozilla Thunderbird 128.4 * new: Export Thunderbird account settings to Thunderbird Mobile via QRCode * fixed: Unable to send an unencrypted response to an OpenPGP encrypted message * fixed: Thunderbird update did not update language pack version until another restart * fixed: Security fixes MFSA 2024-58 (bsc#1231879) * CVE-2024-10458 Permission leak via embed or object elements * CVE-2024-10459 Use-after-free in layout with accessibility * CVE-2024-10460 Confusing display of origin for external protocol handler prompt * CVE-2024-10461 XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response * CVE-2024-10462 Origin of permission prompt could be spoofed by long URL * CVE-2024-10463 Cross origin video frame leak * CVE-2024-10464 History interface could have been used to cause a Denial of Service condition in the browser * CVE-2024-10465 Clipboard 'paste' button persisted across tabs * CVE-2024-10466 DOM push subscription message could hang ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'MozillaThunderbird' package(s) on openSUSE Leap 15.5, openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-10458 Common Vulnerability Exposure (CVE) ID: CVE-2024-10459 Common Vulnerability Exposure (CVE) ID: CVE-2024-10460 Common Vulnerability Exposure (CVE) ID: CVE-2024-10461 Common Vulnerability Exposure (CVE) ID: CVE-2024-10462 Common Vulnerability Exposure (CVE) ID: CVE-2024-10463 Common Vulnerability Exposure (CVE) ID: CVE-2024-10464 Common Vulnerability Exposure (CVE) ID: CVE-2024-10465 Common Vulnerability Exposure (CVE) ID: CVE-2024-10466 Common Vulnerability Exposure (CVE) ID: CVE-2024-10467 Common Vulnerability Exposure (CVE) ID: CVE-2024-11159 |
Copyright | Copyright (C) 2024 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |