Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
| Package | mail-client/thunderbird on all architectures | 
|---|---|
| Affected versions | < 78.6.1 | 
| Unaffected versions | >= 78.6.1 | 
| Package | mail-client/thunderbird-bin on all architectures | 
|---|---|
| Affected versions | < 78.6.1 | 
| Unaffected versions | >= 78.6.1 | 
Mozilla Thunderbird is a popular open-source email client from the Mozilla project.
A use-after-free bug was discovered in Mozilla Thunderbird handling of SCTP.
A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
There is no known workaround at this time.
All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-78.6.1"
All Mozilla Thunderbird binary users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-78.6.1"
      Release date
      
      January 22, 2021
    
      Latest revision
      
      January 22, 2021: 1
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries