Mozilla Foundation Security Advisory 2024-31

Security Vulnerabilities fixed in Thunderbird 115.13

Announced
July 15, 2024
Impact
high
Products
Thunderbird
Fixed in
  • Thunderbird 115.13

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.

Updated Sept 6, 2024 to add CVE-2024-7652 which was embargoed in the original advisory due affecting multiple organizations.

#CVE-2024-7652: Type Confusion in Async Generators in Javascript Engine

Reporter
Nils Bars
Impact
high
Description

An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash.

References

#CVE-2024-6600: Memory corruption in WebGL API

Reporter
pwn2car
Impact
moderate
Description

Due to large allocation checks in Angle for GLSL shaders being too lenient an out-of-bounds access could occur when allocating more than 8192 ints in private shader memory on mac OS.

References

#CVE-2024-6601: Race condition in permission assignment

Reporter
Andreas Farre
Impact
moderate
Description

A race condition could lead to a cross-origin container obtaining permissions of the top-level origin.

References

#CVE-2024-6602: Memory corruption in NSS

Reporter
Ronald Crane
Impact
moderate
Description

A mismatch between allocator and deallocator could have led to memory corruption.

References

#CVE-2024-6603: Memory corruption in thread creation

Reporter
Irvan Kurniawan
Impact
moderate
Description

In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption.

References

#CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, Thunderbird 128, and Thunderbird 115.13

Reporter
Mozilla developers
Impact
high
Description

Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References