First published: Tue Jan 02 2024(Updated: )
Important: thunderbird security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird-debuginfo | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird-debugsource | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird-debuginfo | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird-debugsource | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird-debuginfo | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird-debugsource | <115.6.0-1.el8_9 | 115.6.0-1.el8_9 |
redhat/thunderbird | <115.6.0-1.el8_9.aa | 115.6.0-1.el8_9.aa |
redhat/thunderbird-debuginfo | <115.6.0-1.el8_9.aa | 115.6.0-1.el8_9.aa |
redhat/thunderbird-debugsource | <115.6.0-1.el8_9.aa | 115.6.0-1.el8_9.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0003 is classified as Important.
To fix RHSA-2024:0003, upgrade Thunderbird to version 115.6.0-1.el8_9.
RHSA-2024:0003 addresses a heap-buffer-overflow vulnerability in WebGL's DrawElementsInstanced method.
RHSA-2024:0003 affects the Thunderbird mail client and its associated debug and debug source packages.
Yes, upgrading to Thunderbird version 115.6.0-1.el8_9 resolves the issues outlined in RHSA-2024:0003.