First published: Tue Jan 02 2024(Updated: )
Important: thunderbird security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <115.6.0-1.el7_9 | 115.6.0-1.el7_9 |
redhat/thunderbird | <115.6.0-1.el7_9 | 115.6.0-1.el7_9 |
redhat/thunderbird-debuginfo | <115.6.0-1.el7_9 | 115.6.0-1.el7_9 |
redhat/thunderbird | <115.6.0-1.el7_9 | 115.6.0-1.el7_9 |
redhat/thunderbird-debuginfo | <115.6.0-1.el7_9 | 115.6.0-1.el7_9 |
Red Hat Enterprise Linux Workstation Supplementary | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:0027 addresses a heap-buffer-overflow vulnerability affecting the WebGL DrawElementsInstanced method in Mozilla Thunderbird.
To resolve the vulnerabilities mentioned in RHSA-2024:0027, you should upgrade to Thunderbird version 115.6.0-1.el7_9.
RHSA-2024:0027 affects various Red Hat Enterprise Linux products, including Workstation, Server, Desktop, and Power, little endian versions.
Mozilla Thunderbird users may be exposed to security risks caused by a buffer overflow if they do not update to the patched version indicated in RHSA-2024:0027.
Yes, both the thunderbird-debuginfo and its respective architecture-specific versions are affected by the vulnerabilities in RHSA-2024:0027.