[MFSA-2024-44] Security Vulnerabilities fixed in Thunderbird 115.15

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 3

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.

  • CVE-2024-8381: Type confusion when looking up a property name in a "with" block (high)
    A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the <code>with</code> environment.

  • CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (moderate)
    Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console.

  • CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions (moderate)
    The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption.

Package Affected Version
pkg:mozilla/Thunderbird < 115.15
Package Fixed Version
pkg:mozilla/Thunderbird = 115.15
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:mozilla/Thunderbird Thunderbird < 115.15
Fixed pkg:mozilla/Thunderbird Thunderbird = 115.15
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...