Lucene search

K
suseSuseOPENSUSE-SU-2019:1162-1
HistoryApr 05, 2019 - 12:00 a.m.

Security update for MozillaThunderbird (important)

2019-04-0500:00:00
lists.opensuse.org
148

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.966 High

EPSS

Percentile

99.5%

An update that fixes 16 vulnerabilities is now available.

Description:

This update for MozillaThunderbird to version 60.5.1 fixes the following
issues:

Security issues fixed:

  • Update to MozillaThunderbird 60.6.1 (bsc#1130262):

  • CVE-2019-9813: Fixed Ionmonkey type confusion with proto mutations

  • CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

  • Update to MozillaThunderbird 60.6 (bsc#1129821):

  • CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file

  • CVE-2019-9801: Fixed an issue which could allow Windows programs to be
    exposed to web content

  • CVE-2019-9788: Fixed multiple memory safety bugs

  • CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use
    DOM elements

  • CVE-2019-9791: Fixed an incorrect Type inference for constructors
    entered through on-stack replacement with IonMonkey

  • CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT
    magic value to script

  • CVE-2019-9793: Fixed multiple improper bounds checks when Spectre
    mitigations are disabled

  • CVE-2019-9794: Fixed an issue where command line arguments not discarded
    during execution

  • CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT
    compiler

  • CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation
    controller

  • Update to MozillaThunderbird 60.5.1 (bsc#1125330):

  • CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library
    which can occur when creating a path, leading to a potentially
    exploitable crash.

  • CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia
    library which can occur after specific transform operations, leading to
    a potentially exploitable crash.

  • CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia
    library which can occur with Canvas 2D acceleration on macOS. This issue
    was addressed by disabling Canvas 2D acceleration in Firefox ESR. Note:
    this does not affect other versions and platforms where Canvas 2D
    acceleration is already disabled by default.

  • CVE-2018-18509: Fixed a flaw which during verification of certain S/MIME
    signatures showing mistakenly that emails bring a valid sugnature.
    Release notes:
    https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
    https://www.mozilla.org/en-US/security/advisories/mfsa2019-11/
    https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.0:

    zypper in -t patch openSUSE-2019-1162=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.0x86_64< - openSUSE Leap 15.0 (x86_64):- openSUSE Leap 15.0 (x86_64):.x86_64.rpm

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.966 High

EPSS

Percentile

99.5%