Lucene search

K
suseSuseOPENSUSE-SU-2020:2022-1
HistoryNov 26, 2020 - 12:00 a.m.

Security update for MozillaThunderbird (moderate)

2020-11-2600:00:00
lists.opensuse.org
8

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

An update that fixes one vulnerability is now available.

Description:

This update for MozillaThunderbird fixes the following issues:

  • Mozilla Thunderbird 78.4.2 MFSA 2020-49 (bsc#1178611)
    • CVE-2020-26950 (bmo#1675905) Write side effects in MCallGetProperty
      opcode not accounted for
  • Mozilla Thunderbird 78.4.1
    • new: Thunderbird prompts for an address to use when starting an email
      from an address book entry with multiple addresses (bmo#84028)
    • fixed: Searching global search results did not work (bmo#1664761)
    • fixed: Link location was not focused by default when adding a
      hyperlink in message composer (bmo#1670660)
    • fixed: Advanced address book search dialog was unusable (bmo#1668147)
    • fixed: Encrypted draft reply emails lost “Re:” prefix (bmo#1661510)
    • fixed: Replying to a newsgroup message did not open the compose window
      (bmo#1672667)
    • fixed: Unable to delete multiple newsgroup messages (bmo#1657988)
    • fixed: Appmenu displayed visual glitches (bmo#1636243)
    • fixed: Visual glitches when selecting multiple messages in the message
      pane and using Ctrl+click (bmo#1671800)
    • fixed: Switching between dark and light mode could lead to unreadable
      text on macOS (bmo#1668989)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2020-2022=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C