First published: Tue Jan 02 2024(Updated: )
Important: thunderbird security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird-debuginfo | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird-debugsource | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird-debuginfo | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird-debugsource | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird-debuginfo | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird-debugsource | <115.6.0-1.el9_3 | 115.6.0-1.el9_3 |
redhat/thunderbird | <115.6.0-1.el9_3.aa | 115.6.0-1.el9_3.aa |
redhat/thunderbird-debuginfo | <115.6.0-1.el9_3.aa | 115.6.0-1.el9_3.aa |
redhat/thunderbird-debugsource | <115.6.0-1.el9_3.aa | 115.6.0-1.el9_3.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0001 is classified as important due to the potential security impact of the heap buffer overflow vulnerability.
To fix RHSA-2024:0001, you need to upgrade Mozilla Thunderbird to version 115.6.0-1.el9_3.
RHSA-2024:0001 addresses a heap-buffer-overflow vulnerability affecting WebGL's DrawElementsInstanced method.
RHSA-2024:0001 affects various versions of Thunderbird prior to 115.6.0-1.el9_3.
Yes, users of affected products should prioritize applying the security updates outlined in RHSA-2024:0001.