Skip to content

Commit

Permalink
Add Thunderbird Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
tomrittervg committed Sep 6, 2024
1 parent d321871 commit 1c7adcc
Show file tree
Hide file tree
Showing 2 changed files with 109 additions and 0 deletions.
68 changes: 68 additions & 0 deletions announce/2024/mfsa2024-43.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
## mfsa2024-43.yml
announced: September 3, 2024
impact: high
fixed_in:
- Thunderbird 128.2
title: Security Vulnerabilities fixed in Thunderbird 128.2
description: |
*In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.*
advisories:
CVE-2024-8385:
title: WASM type confusion involving ArrayTypes
impact: high
reporter: Seunghyun Lee
description: |
A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability.
bugs:
- url: 1911909
CVE-2024-8381:
title: Type confusion when looking up a property name in a "with" block
impact: high
reporter: Nils Bars
description: |
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the <code>with</code> environment.
bugs:
- url: 1912715
CVE-2024-8382:
title: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran
impact: moderate
reporter: Gregory Pappas
description: |
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console.
bugs:
- url: 1906744
CVE-2024-8383:
title: 'Firefox did not ask before openings news: links in an external application'
impact: moderate
reporter: D7
description: |
Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will.
bugs:
- url: 1908496
CVE-2024-8384:
title: Garbage collection could mis-color cross-compartment objects in OOM conditions
impact: moderate
reporter: the Mozilla Fuzzing Team
description: |
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption.
bugs:
- url: 1911288
CVE-2024-8386:
title: SelectElements could be shown over another site if popups are allowed
impact: low
reporter: Shaheen Fazim, Hafiizh
description: |
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack.
bugs:
- url: 1909529
- url: 1907032
- url: 1909163
CVE-2024-8387:
title: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
impact: high
reporter: the Mozilla Fuzzing Team, Yury Delendik
description: |
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
bugs:
- url: 1857607, 1911858, 1914009
desc: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
41 changes: 41 additions & 0 deletions announce/2024/mfsa2024-44.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
## mfsa2024-44.yml
announced: September 3, 2024
impact: high
fixed_in:
- Thunderbird 115.15
title: Security Vulnerabilities fixed in Thunderbird 115.15
description: |
*In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.*
advisories:
CVE-2024-8381:
title: Type confusion when looking up a property name in a &quot;with&quot; block
impact: high
reporter: Nils Bars
description: |
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the <code>with</code> environment.
bugs:
- url: 1912715
CVE-2024-8382:
title: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran
impact: moderate
reporter: Gregory Pappas
description: |
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console.
bugs:
- url: 1906744
CVE-2024-8383:
title: 'Thunderbird did not ask before openings news: links in an external application'
impact: moderate
reporter: D7
description: |
Thunderbird normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will.
bugs:
- url: 1908496
CVE-2024-8384:
title: Garbage collection could mis-color cross-compartment objects in OOM conditions
impact: moderate
reporter: the Mozilla Fuzzing Team
description: |
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption.
bugs:
- url: 1911288

0 comments on commit 1c7adcc

Please sign in to comment.