SUSE-SU-2019:0853-1: important: Security update for MozillaThunderbird
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Wed Apr 3 07:14:37 MDT 2019
SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: SUSE-SU-2019:0853-1
Rating: important
References: #1125330 #1129821 #1130262
Cross-References: CVE-2018-18335 CVE-2018-18356 CVE-2018-18506
CVE-2018-18509 CVE-2019-5785 CVE-2019-9788
CVE-2019-9790 CVE-2019-9791 CVE-2019-9792
CVE-2019-9793 CVE-2019-9794 CVE-2019-9795
CVE-2019-9796 CVE-2019-9801 CVE-2019-9810
CVE-2019-9813
Affected Products:
SUSE Linux Enterprise Workstation Extension 15
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update for MozillaThunderbird to version 60.5.1 fixes the following
issues:
Security issues fixed:
- Update to MozillaThunderbird 60.6.1 (bsc#1130262):
- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information
- Update to MozillaThunderbird 60.6 (bsc#1129821):
- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be
exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use
DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors
entered through on-stack replacement with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT
magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre
mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded
during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT
compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation
controller
- Update to MozillaThunderbird 60.5.1 (bsc#1125330):
- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library
which can occur when creating a path, leading to a potentially
exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia
library which can occur after specific transform operations, leading to
a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia
library which can occur with Canvas 2D acceleration on macOS. This issue
was addressed by disabling Canvas 2D acceleration in Firefox ESR. Note:
this does not affect other versions and platforms where Canvas 2D
acceleration is already disabled by default.
- CVE-2018-18509: Fixed a flaw which during verification of certain S/MIME
signatures showing mistakenly that emails bring a valid sugnature.
Release notes:
https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 15:
zypper in -t patch SUSE-SLE-Product-WE-15-2019-853=1
Package List:
- SUSE Linux Enterprise Workstation Extension 15 (x86_64):
MozillaThunderbird-60.6.1-3.28.1
MozillaThunderbird-debuginfo-60.6.1-3.28.1
MozillaThunderbird-debugsource-60.6.1-3.28.1
MozillaThunderbird-translations-common-60.6.1-3.28.1
MozillaThunderbird-translations-other-60.6.1-3.28.1
References:
https://www.suse.com/security/cve/CVE-2018-18335.html
https://www.suse.com/security/cve/CVE-2018-18356.html
https://www.suse.com/security/cve/CVE-2018-18506.html
https://www.suse.com/security/cve/CVE-2018-18509.html
https://www.suse.com/security/cve/CVE-2019-5785.html
https://www.suse.com/security/cve/CVE-2019-9788.html
https://www.suse.com/security/cve/CVE-2019-9790.html
https://www.suse.com/security/cve/CVE-2019-9791.html
https://www.suse.com/security/cve/CVE-2019-9792.html
https://www.suse.com/security/cve/CVE-2019-9793.html
https://www.suse.com/security/cve/CVE-2019-9794.html
https://www.suse.com/security/cve/CVE-2019-9795.html
https://www.suse.com/security/cve/CVE-2019-9796.html
https://www.suse.com/security/cve/CVE-2019-9801.html
https://www.suse.com/security/cve/CVE-2019-9810.html
https://www.suse.com/security/cve/CVE-2019-9813.html
https://bugzilla.suse.com/1125330
https://bugzilla.suse.com/1129821
https://bugzilla.suse.com/1130262
More information about the sle-updates
mailing list