openSUSE: 2021:0208-1 important: MozillaThunderbird
Description
This update for MozillaThunderbird fixes the following issues: - Mozilla Thunderbird was updated to 78.7.0 ESR (MFSA 2021-05, bsc#1181414) * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC * CVE-2021-23964: Fixed Memory safety bugs * CVE-2020-15685: Fixed an IMAP Response Injection when using STARTTLS This update was imported from the SUSE:SLE-15:Update update project.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2021-208=1
Package List
- openSUSE Leap 15.1 (x86_64): MozillaThunderbird-78.7.0-lp151.2.69.1 MozillaThunderbird-debuginfo-78.7.0-lp151.2.69.1 MozillaThunderbird-debugsource-78.7.0-lp151.2.69.1 MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1
References
https://www.suse.com/security/cve/CVE-2020-15685.html https://www.suse.com/security/cve/CVE-2020-26976.html https://www.suse.com/security/cve/CVE-2021-23953.html https://www.suse.com/security/cve/CVE-2021-23954.html https://www.suse.com/security/cve/CVE-2021-23960.html https://www.suse.com/security/cve/CVE-2021-23964.html https://bugzilla.suse.com/1181414