Security update for MozillaThunderbird
Announcement ID: | SUSE-SU-2022:0559-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for MozillaThunderbird fixes the following issues:
- Mozilla Thunderbird 91.6.1 / MFSA 2022-07 (bsc#1196072)
-
CVE-2022-0566 (bmo#1753094) Crafted email could trigger an out-of-bounds write
-
Mozilla Thunderbird 91.6 / MFSA 2022-06 (bsc#1195682)
- CVE-2022-22753 (bmo#1732435) Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754 (bmo#1750565) Extensions could have bypassed permission confirmation during update
- CVE-2022-22756 (bmo#1317873) Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759 (bmo#1739957) Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760 (bmo#1740985, bmo#1748503) Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761 (bmo#1745566) frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763 (bmo#1740534) Script Execution during invalid object state
- CVE-2022-22764 (bmo#1742682, bmo#1744165, bmo#1746545, bmo#1748210, bmo#1748279) Memory safety bugs fixed in Thunderbird 91.6
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Workstation Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2022-559=1
Package List:
-
SUSE Linux Enterprise Workstation Extension 15 SP3 (x86_64)
- MozillaThunderbird-debuginfo-91.6.1-8.54.1
- MozillaThunderbird-debugsource-91.6.1-8.54.1
- MozillaThunderbird-translations-common-91.6.1-8.54.1
- MozillaThunderbird-91.6.1-8.54.1
- MozillaThunderbird-translations-other-91.6.1-8.54.1
References:
- https://www.suse.com/security/cve/CVE-2022-0566.html
- https://www.suse.com/security/cve/CVE-2022-22753.html
- https://www.suse.com/security/cve/CVE-2022-22754.html
- https://www.suse.com/security/cve/CVE-2022-22756.html
- https://www.suse.com/security/cve/CVE-2022-22759.html
- https://www.suse.com/security/cve/CVE-2022-22760.html
- https://www.suse.com/security/cve/CVE-2022-22761.html
- https://www.suse.com/security/cve/CVE-2022-22763.html
- https://www.suse.com/security/cve/CVE-2022-22764.html
- https://bugzilla.suse.com/show_bug.cgi?id=1195682
- https://bugzilla.suse.com/show_bug.cgi?id=1196072