Multiple vulnerabilities have been found in Mozilla Firefox and Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
Package | www-client/firefox on all architectures |
---|---|
Affected versions | < 84.0 |
Unaffected versions | >= 78.6.0 >= 84.0 |
Package | www-client/firefox-bin on all architectures |
---|---|
Affected versions | < 84.0 |
Unaffected versions | >= 78.6.0 >= 84.0 |
Package | mail-client/thunderbird on all architectures |
---|---|
Affected versions | < 78.6.0 |
Unaffected versions | >= 78.6.0 |
Package | mail-client/thunderbird-bin on all architectures |
---|---|
Affected versions | < 78.6.0 |
Unaffected versions | >= 78.6.0 |
Mozilla Firefox is a popular open-source web browser from the Mozilla project.
Mozilla Thunderbird is a popular open-source email client from the Mozilla project.
Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.
Please review the referenced CVE identifiers for details.
There is no known workaround at this time.
All Mozilla Firefox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-84.0"
All Mozilla Firefox (bin) users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-84.0"
All Mozilla Firefox ESR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-78.6.0:0/esr78"
All Mozilla Firefox ESR (bin) users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-78.6.0:0/esr78"
All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-78.6.0"
All Mozilla Thunderbird (bin) users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-78.6.0"
Release date
December 23, 2020
Latest revision
December 23, 2020: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries