9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.966 High
EPSS
Percentile
99.5%
An update that fixes 16 vulnerabilities is now available.
Description:
This update for MozillaThunderbird to version 60.5.1 fixes the following
issues:
Security issues fixed:
Update to MozillaThunderbird 60.6.1 (bsc#1130262):
CVE-2019-9813: Fixed Ionmonkey type confusion with proto mutations
CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information
Update to MozillaThunderbird 60.6 (bsc#1129821):
CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file
CVE-2019-9801: Fixed an issue which could allow Windows programs to be
exposed to web content
CVE-2019-9788: Fixed multiple memory safety bugs
CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use
DOM elements
CVE-2019-9791: Fixed an incorrect Type inference for constructors
entered through on-stack replacement with IonMonkey
CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT
magic value to script
CVE-2019-9793: Fixed multiple improper bounds checks when Spectre
mitigations are disabled
CVE-2019-9794: Fixed an issue where command line arguments not discarded
during execution
CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT
compiler
CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation
controller
Update to MozillaThunderbird 60.5.1 (bsc#1125330):
CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library
which can occur when creating a path, leading to a potentially
exploitable crash.
CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia
library which can occur after specific transform operations, leading to
a potentially exploitable crash.
CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia
library which can occur with Canvas 2D acceleration on macOS. This issue
was addressed by disabling Canvas 2D acceleration in Firefox ESR. Note:
this does not affect other versions and platforms where Canvas 2D
acceleration is already disabled by default.
CVE-2018-18509: Fixed a flaw which during verification of certain S/MIME
signatures showing mistakenly that emails bring a valid sugnature.
Release notes:
https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1162=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Leap | 15.0 | x86_64 | < - openSUSE Leap 15.0 (x86_64): | - openSUSE Leap 15.0 (x86_64):.x86_64.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.966 High
EPSS
Percentile
99.5%