A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
{
"binaries": [
{
"binary_version": "1:140.7.1+build1-0ubuntu0.22.04.1",
"binary_name": "thunderbird"
},
{
"binary_version": "1:140.7.1+build1-0ubuntu0.22.04.1",
"binary_name": "thunderbird-gnome-support"
},
{
"binary_version": "1:140.7.1+build1-0ubuntu0.22.04.1",
"binary_name": "thunderbird-mozsymbols"
},
{
"binary_version": "1:140.7.1+build1-0ubuntu0.22.04.1",
"binary_name": "xul-ext-calendar-timezones"
},
{
"binary_version": "1:140.7.1+build1-0ubuntu0.22.04.1",
"binary_name": "xul-ext-gdata-provider"
},
{
"binary_version": "1:140.7.1+build1-0ubuntu0.22.04.1",
"binary_name": "xul-ext-lightning"
}
],
"availability": "No subscription required"
}