Security update for MozillaThunderbird
Announcement ID: | SUSE-SU-2019:2515-1 |
---|---|
Rating: | important |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 27 vulnerabilities can now be installed.
Description:
This update for MozillaThunderbird to version 68.1.1 fixes the following issues:
- CVE-2019-11709: Fixed several memory safety bugs. (bsc#1140868)
- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)
- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)
- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins. (bsc#1140868)
- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)
- CVE-2019-11714: Fixed a crash in NeckoChild. (bsc#1140868)
- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)
- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)
- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)
- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)
- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)
- CVE-2019-11721: Fixed domain spoofing through unicode latin 'kra' character. (bsc#1140868)
- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)
- CVE-2019-11724: Fixed a permissions issue with the retired site input.mozilla.org. (bsc#1140868)
- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)
- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3. (bsc#1140868)
- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)
- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)
- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)
- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)
- CVE-2019-11743: Fixed a cross-origin access issue. (bsc#1149298)
- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed. (bsc#1152375)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Workstation Extension 15 SP1
zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2019-2515=1
-
SUSE Linux Enterprise Workstation Extension 15
zypper in -t patch SUSE-SLE-Product-WE-15-2019-2515=1
Package List:
-
SUSE Linux Enterprise Workstation Extension 15 SP1 (x86_64)
- MozillaThunderbird-translations-common-68.1.1-3.51.1
- MozillaThunderbird-translations-other-68.1.1-3.51.1
- MozillaThunderbird-68.1.1-3.51.1
- MozillaThunderbird-debugsource-68.1.1-3.51.1
- MozillaThunderbird-debuginfo-68.1.1-3.51.1
-
SUSE Linux Enterprise Workstation Extension 15 (x86_64)
- MozillaThunderbird-translations-common-68.1.1-3.51.1
- MozillaThunderbird-translations-other-68.1.1-3.51.1
- MozillaThunderbird-68.1.1-3.51.1
- MozillaThunderbird-debugsource-68.1.1-3.51.1
- MozillaThunderbird-debuginfo-68.1.1-3.51.1
References:
- https://www.suse.com/security/cve/CVE-2019-11709.html
- https://www.suse.com/security/cve/CVE-2019-11710.html
- https://www.suse.com/security/cve/CVE-2019-11711.html
- https://www.suse.com/security/cve/CVE-2019-11712.html
- https://www.suse.com/security/cve/CVE-2019-11713.html
- https://www.suse.com/security/cve/CVE-2019-11714.html
- https://www.suse.com/security/cve/CVE-2019-11715.html
- https://www.suse.com/security/cve/CVE-2019-11716.html
- https://www.suse.com/security/cve/CVE-2019-11717.html
- https://www.suse.com/security/cve/CVE-2019-11719.html
- https://www.suse.com/security/cve/CVE-2019-11720.html
- https://www.suse.com/security/cve/CVE-2019-11721.html
- https://www.suse.com/security/cve/CVE-2019-11723.html
- https://www.suse.com/security/cve/CVE-2019-11724.html
- https://www.suse.com/security/cve/CVE-2019-11725.html
- https://www.suse.com/security/cve/CVE-2019-11727.html
- https://www.suse.com/security/cve/CVE-2019-11728.html
- https://www.suse.com/security/cve/CVE-2019-11729.html
- https://www.suse.com/security/cve/CVE-2019-11730.html
- https://www.suse.com/security/cve/CVE-2019-11739.html
- https://www.suse.com/security/cve/CVE-2019-11740.html
- https://www.suse.com/security/cve/CVE-2019-11742.html
- https://www.suse.com/security/cve/CVE-2019-11743.html
- https://www.suse.com/security/cve/CVE-2019-11744.html
- https://www.suse.com/security/cve/CVE-2019-11746.html
- https://www.suse.com/security/cve/CVE-2019-11752.html
- https://www.suse.com/security/cve/CVE-2019-11755.html
- https://bugzilla.suse.com/show_bug.cgi?id=1140868
- https://bugzilla.suse.com/show_bug.cgi?id=1141322
- https://bugzilla.suse.com/show_bug.cgi?id=1149296
- https://bugzilla.suse.com/show_bug.cgi?id=1149297
- https://bugzilla.suse.com/show_bug.cgi?id=1149298
- https://bugzilla.suse.com/show_bug.cgi?id=1149299
- https://bugzilla.suse.com/show_bug.cgi?id=1149303
- https://bugzilla.suse.com/show_bug.cgi?id=1149304
- https://bugzilla.suse.com/show_bug.cgi?id=1150939
- https://bugzilla.suse.com/show_bug.cgi?id=1152375