SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0853-1
Rating:             important
References:         #1125330 #1129821 #1130262 
Cross-References:   CVE-2018-18335 CVE-2018-18356 CVE-2018-18506
                    CVE-2018-18509 CVE-2019-5785 CVE-2019-9788
                    CVE-2019-9790 CVE-2019-9791 CVE-2019-9792
                    CVE-2019-9793 CVE-2019-9794 CVE-2019-9795
                    CVE-2019-9796 CVE-2019-9801 CVE-2019-9810
                    CVE-2019-9813
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 15
______________________________________________________________________________

   An update that fixes 16 vulnerabilities is now available.

Description:

   This update for MozillaThunderbird to version 60.5.1 fixes the following
   issues:

   Security issues fixed:

   - Update to MozillaThunderbird 60.6.1 (bsc#1130262):

   - CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
   - CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

   - Update to MozillaThunderbird 60.6 (bsc#1129821):

   - CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file
   - CVE-2019-9801: Fixed an issue which could allow Windows programs to be
     exposed to web content
   - CVE-2019-9788: Fixed multiple memory safety bugs
   - CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use
     DOM elements
   - CVE-2019-9791: Fixed an incorrect Type inference for constructors     entered through on-stack replacement with IonMonkey
   - CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT
     magic value to script
   - CVE-2019-9793: Fixed multiple improper bounds checks when Spectre
     mitigations are disabled
   - CVE-2019-9794: Fixed an issue where command line arguments not discarded
     during execution
   - CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT
     compiler
   - CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation
     controller

   - Update to MozillaThunderbird 60.5.1 (bsc#1125330):

   - CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library
     which can occur when creating a path, leading to a potentially
     exploitable crash.
   - CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia
     library which can occur after specific transform operations, leading to
     a potentially exploitable crash.
   - CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia
     library which can occur with Canvas 2D acceleration on macOS. This issue
     was addressed by disabling Canvas 2D acceleration in Firefox ESR.  Note:
     this does not affect other versions and platforms where Canvas 2D
     acceleration is already disabled by default.
   - CVE-2018-18509: Fixed a flaw which during verification of certain S/MIME
     signatures showing mistakenly that emails bring a valid sugnature.
     Release notes:
     https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
     https://www.mozilla.org/en-US/security/advisories/mfsa2019-11/
     https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 15:

      zypper in -t patch SUSE-SLE-Product-WE-15-2019-853=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 15 (x86_64):

      MozillaThunderbird-60.6.1-3.28.1
      MozillaThunderbird-debuginfo-60.6.1-3.28.1
      MozillaThunderbird-debugsource-60.6.1-3.28.1
      MozillaThunderbird-translations-common-60.6.1-3.28.1
      MozillaThunderbird-translations-other-60.6.1-3.28.1


References:

   https://www.suse.com/security/cve/CVE-2018-18335.html
   https://www.suse.com/security/cve/CVE-2018-18356.html
   https://www.suse.com/security/cve/CVE-2018-18506.html
   https://www.suse.com/security/cve/CVE-2018-18509.html
   https://www.suse.com/security/cve/CVE-2019-5785.html
   https://www.suse.com/security/cve/CVE-2019-9788.html
   https://www.suse.com/security/cve/CVE-2019-9790.html
   https://www.suse.com/security/cve/CVE-2019-9791.html
   https://www.suse.com/security/cve/CVE-2019-9792.html
   https://www.suse.com/security/cve/CVE-2019-9793.html
   https://www.suse.com/security/cve/CVE-2019-9794.html
   https://www.suse.com/security/cve/CVE-2019-9795.html
   https://www.suse.com/security/cve/CVE-2019-9796.html
   https://www.suse.com/security/cve/CVE-2019-9801.html
   https://www.suse.com/security/cve/CVE-2019-9810.html
   https://www.suse.com/security/cve/CVE-2019-9813.html
   https://bugzilla.suse.com/1125330
   https://bugzilla.suse.com/1129821
   https://bugzilla.suse.com/1130262

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:0853-1 important: MozillaThunderbird

April 3, 2019
An update that fixes 16 vulnerabilities is now available

Summary

This update for MozillaThunderbird to version 60.5.1 fixes the following issues: Security issues fixed: - Update to MozillaThunderbird 60.6.1 (bsc#1130262): - CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations - CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information - Update to MozillaThunderbird 60.6 (bsc#1129821): - CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file - CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content - CVE-2019-9788: Fixed multiple memory safety bugs - CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements - CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement with IonMonkey - CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script - CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled - CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution - CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler - CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller - Update to MozillaThunderbird 60.5.1 (bsc#1125330): - CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when creating a path, leading to a potentially exploitable crash. - CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur after specific transform operations, leading to a potentially exploitable crash. - CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration in Firefox ESR. Note: this does not affect other versions and platforms where Canvas 2D acceleration is already disabled by default. - CVE-2018-18509: Fixed a flaw which during verification of certain S/MIME signatures showing mistakenly that emails bring a valid sugnature. Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-11/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/ Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15: zypper in -t patch SUSE-SLE-Product-WE-15-2019-853=1 Package List: - SUSE Linux Enterprise Workstation Extension 15 (x86_64): MozillaThunderbird-60.6.1-3.28.1 MozillaThunderbird-debuginfo-60.6.1-3.28.1 MozillaThunderbird-debugsource-60.6.1-3.28.1 MozillaThunderbird-translations-common-60.6.1-3.28.1 MozillaThunderbird-translations-other-60.6.1-3.28.1

References

#1125330 #1129821 #1130262

Cross- CVE-2018-18335 CVE-2018-18356 CVE-2018-18506

CVE-2018-18509 CVE-2019-5785 CVE-2019-9788

CVE-2019-9790 CVE-2019-9791 CVE-2019-9792

CVE-2019-9793 CVE-2019-9794 CVE-2019-9795

CVE-2019-9796 CVE-2019-9801 CVE-2019-9810

CVE-2019-9813

Affected Products:

SUSE Linux Enterprise Workstation Extension 15

https://www.suse.com/security/cve/CVE-2018-18335.html

https://www.suse.com/security/cve/CVE-2018-18356.html

https://www.suse.com/security/cve/CVE-2018-18506.html

https://www.suse.com/security/cve/CVE-2018-18509.html

https://www.suse.com/security/cve/CVE-2019-5785.html

https://www.suse.com/security/cve/CVE-2019-9788.html

https://www.suse.com/security/cve/CVE-2019-9790.html

https://www.suse.com/security/cve/CVE-2019-9791.html

https://www.suse.com/security/cve/CVE-2019-9792.html

https://www.suse.com/security/cve/CVE-2019-9793.html

https://www.suse.com/security/cve/CVE-2019-9794.html

https://www.suse.com/security/cve/CVE-2019-9795.html

https://www.suse.com/security/cve/CVE-2019-9796.html

https://www.suse.com/security/cve/CVE-2019-9801.html

https://www.suse.com/security/cve/CVE-2019-9810.html

https://www.suse.com/security/cve/CVE-2019-9813.html

https://bugzilla.suse.com/1125330

https://bugzilla.suse.com/1129821

https://bugzilla.suse.com/1130262

Severity
Announcement ID: SUSE-SU-2019:0853-1
Rating: important

Related News