Security update for MozillaThunderbird
SUSE Security Update: Security update for MozillaThunderbirdAnnouncement ID: | SUSE-SU-2020:1027-1 |
Rating: | important |
References: | #1168630 #1168874 |
Cross-References: | CVE-2020-6819 CVE-2020-6820 CVE-2020-6821 CVE-2020-6822 CVE-2020-6825 |
Affected Products: |
|
An update that fixes 5 vulnerabilities is now available.
Description:
This update for MozillaThunderbird to version 68.7.0 fixes the following
issues:
- CVE-2020-6819: Use-after-free while running the nsDocShell destructor (boo#1168630)
- CVE-2020-6820: Use-after-free when handling a ReadableStream (boo#1168630)
- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage() (boo#1168874)
- CVE-2020-6822: Out of bounds write in GMPDecodeData when processing large images (boo#1168874)
- CVE-2020-6825: Memory safety bugs fixed (boo#1168874)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 15-SP1:
zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2020-1027=1
Package List:
- SUSE Linux Enterprise Workstation Extension 15-SP1 (x86_64):
- MozillaThunderbird-68.7.0-3.77.1
- MozillaThunderbird-debuginfo-68.7.0-3.77.1
- MozillaThunderbird-debugsource-68.7.0-3.77.1
- MozillaThunderbird-translations-common-68.7.0-3.77.1
- MozillaThunderbird-translations-other-68.7.0-3.77.1
References:
- https://www.suse.com/security/cve/CVE-2020-6819.html
- https://www.suse.com/security/cve/CVE-2020-6820.html
- https://www.suse.com/security/cve/CVE-2020-6821.html
- https://www.suse.com/security/cve/CVE-2020-6822.html
- https://www.suse.com/security/cve/CVE-2020-6825.html
- https://bugzilla.suse.com/1168630
- https://bugzilla.suse.com/1168874