An update that fixes 10 vulnerabilities is now available.
Description:
This update for MozillaThunderbird fixes the following issues:
- CVE-2022-2200: Undesired attributes could be set as part of prototype
pollution (bmo#1771381)
- CVE-2022-2226: An email with a mismatching OpenPGP signature date was
accepted as valid (bmo#1775441)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be
bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being
blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts
a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay
the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt
(bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Thunderbird 91.11 and
Thunderbird 102 (bmo#1763634, bmo#1772651)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2320=1
openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2320=1
SUSE Linux Enterprise Workstation Extension 15-SP4:
zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2022-2320=1
SUSE Linux Enterprise Workstation Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2022-2320=1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2320=1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2320=1