Lucene search

K
suseSuseOPENSUSE-SU-2020:1780-1
HistoryOct 31, 2020 - 12:00 a.m.

Security update for MozillaThunderbird and mozilla-nspr (important)

2020-10-3100:00:00
lists.opensuse.org
54

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

An update that fixes 6 vulnerabilities is now available.

Description:

This update for MozillaThunderbird and mozilla-nspr fixes the following
issues:

  • Mozilla Thunderbird 78.4

    • new: MailExtensions: browser.tabs.sendMessage API added
    • new: MailExtensions: messageDisplayScripts API added
    • changed: Yahoo and AOL mail users using password authentication will
      be migrated to OAuth2
    • changed: MailExtensions: messageDisplay APIs extended to support
      multiple selected messages
    • changed: MailExtensions: compose.begin functions now support creating
      a message with attachments
    • fixed: Thunderbird could freeze when updating global search index
    • fixed: Multiple issues with handling of self-signed SSL certificates
      addressed
    • fixed: Recipient address fields in compose window could expand to fill
      all available space
    • fixed: Inserting emoji characters in message compose window caused
      unexpected behavior
    • fixed: Button to restore default folder icon color was not keyboard
      accessible
    • fixed: Various keyboard navigation fixes
    • fixed: Various color-related theme fixes
    • fixed: MailExtensions: Updating attachments with
      onBeforeSend.addListener() did not work MFSA 2020-47 (bsc#1177977)
    • CVE-2020-15969 Use-after-free in usersctp
    • CVE-2020-15683 Memory safety bugs fixed in Thunderbird 78.4
  • Mozilla Thunderbird 78.3.3

    • OpenPGP: Improved support for encrypting with subkeys
    • OpenPGP message status icons were not visible in message header pane
    • Creating a new calendar event did not require an event title
  • Mozilla Thunderbird 78.3.2 (bsc#1176899)

    • OpenPGP: Improved support for encrypting with subkeys
    • OpenPGP: Encrypted messages with international characters were
      sometimes displayed incorrectly
    • Single-click deletion of recipient pills with middle mouse button
      restored
    • Searching an address book list did not display results
    • Dark mode, high contrast, and Windows theming fixes
  • Mozilla Thunderbird 78.3.1

    • fix crash in nsImapProtocol::CreateNewLineFromSocket
  • Mozilla Thunderbird 78.3.0 MFSA 2020-44 (bsc#1176756)

    • CVE-2020-15677 Download origin spoofing via redirect
    • CVE-2020-15676 XSS when pasting attacker-controlled data into a
      contenteditable element
    • CVE-2020-15678 When recursing through layers while scrolling, an
      iterator may have become invalid, resulting in a potential use-after-
      free scenario
    • CVE-2020-15673 Memory safety bugs fixed in Thunderbird 78.3
  • update mozilla-nspr to version 4.25.1

    • The macOS platform code for shared library loading was changed to
      support macOS 11.
    • Dependency needed for the MozillaThunderbird udpate

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2020-1780=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2i586< - openSUSE Leap 15.2 (i586 x86_64):- openSUSE Leap 15.2 (i586 x86_64):.i586.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (i586 x86_64):- openSUSE Leap 15.2 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P