SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0559-1
Rating:             important
References:         #1195682 #1196072 
Cross-References:   CVE-2022-0566 CVE-2022-22753 CVE-2022-22754
                    CVE-2022-22756 CVE-2022-22759 CVE-2022-22760
                    CVE-2022-22761 CVE-2022-22763 CVE-2022-22764
                   
Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP3
                    SUSE Linux Enterprise Server 15-SP3
                    SUSE Linux Enterprise Server for SAP Applications 15-SP3
                    SUSE Linux Enterprise Workstation Extension 15-SP3
______________________________________________________________________________

   An update that fixes 9 vulnerabilities is now available.

Description:

   This update for MozillaThunderbird fixes the following issues:

   - Mozilla Thunderbird 91.6.1 / MFSA 2022-07 (bsc#1196072)
     * CVE-2022-0566 (bmo#1753094) Crafted email could trigger an
       out-of-bounds write

   - Mozilla Thunderbird 91.6 / MFSA 2022-06 (bsc#1195682)
     * CVE-2022-22753 (bmo#1732435) Privilege Escalation to SYSTEM on Windows
       via Maintenance Service
     * CVE-2022-22754 (bmo#1750565) Extensions could have bypassed permission
       confirmation during update
     * CVE-2022-22756 (bmo#1317873) Drag and dropping an image could have
       resulted in the dropped
       object being an executable
     * CVE-2022-22759 (bmo#1739957) Sandboxed iframes could have executed
       script if the parent appended elements
     * CVE-2022-22760 (bmo#1740985, bmo#1748503) Cross-Origin responses could
       be distinguished between script and non-script content-types
     * CVE-2022-22761 (bmo#1745566) frame-ancestors Content Security Policy
       directive was not enforced for framed extension pages
     * CVE-2022-22763 (bmo#1740534) Script Execution during invalid object
       state
     * CVE-2022-22764 (bmo#1742682, bmo#1744165, bmo#1746545, bmo#1748210,
       bmo#1748279) Memory safety bugs fixed in Thunderbird 91.6


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 15-SP3:

      zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2022-559=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 15-SP3 (x86_64):

      MozillaThunderbird-91.6.1-8.54.1
      MozillaThunderbird-debuginfo-91.6.1-8.54.1
      MozillaThunderbird-debugsource-91.6.1-8.54.1
      MozillaThunderbird-translations-common-91.6.1-8.54.1
      MozillaThunderbird-translations-other-91.6.1-8.54.1


References:

   https://www.suse.com/security/cve/CVE-2022-0566.html
   https://www.suse.com/security/cve/CVE-2022-22753.html
   https://www.suse.com/security/cve/CVE-2022-22754.html
   https://www.suse.com/security/cve/CVE-2022-22756.html
   https://www.suse.com/security/cve/CVE-2022-22759.html
   https://www.suse.com/security/cve/CVE-2022-22760.html
   https://www.suse.com/security/cve/CVE-2022-22761.html
   https://www.suse.com/security/cve/CVE-2022-22763.html
   https://www.suse.com/security/cve/CVE-2022-22764.html
   https://bugzilla.suse.com/1195682
   https://bugzilla.suse.com/1196072

SUSE: 2022:0559-1 important: MozillaThunderbird

February 23, 2022
An update that fixes 9 vulnerabilities is now available

Summary

This update for MozillaThunderbird fixes the following issues: - Mozilla Thunderbird 91.6.1 / MFSA 2022-07 (bsc#1196072) * CVE-2022-0566 (bmo#1753094) Crafted email could trigger an out-of-bounds write - Mozilla Thunderbird 91.6 / MFSA 2022-06 (bsc#1195682) * CVE-2022-22753 (bmo#1732435) Privilege Escalation to SYSTEM on Windows via Maintenance Service * CVE-2022-22754 (bmo#1750565) Extensions could have bypassed permission confirmation during update * CVE-2022-22756 (bmo#1317873) Drag and dropping an image could have resulted in the dropped object being an executable * CVE-2022-22759 (bmo#1739957) Sandboxed iframes could have executed script if the parent appended elements * CVE-2022-22760 (bmo#1740985, bmo#1748503) Cross-Origin responses could be distinguished between script and non-script content-types * CVE-2022-22761 (bmo#1745566) frame-ancestors Content Security Policy directive was not enforced for framed extension pages * CVE-2022-22763 (bmo#1740534) Script Execution during invalid object state * CVE-2022-22764 (bmo#1742682, bmo#1744165, bmo#1746545, bmo#1748210, bmo#1748279) Memory safety bugs fixed in Thunderbird 91.6 Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15-SP3: zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2022-559=1 Package List: - SUSE Linux Enterprise Workstation Extension 15-SP3 (x86_64): MozillaThunderbird-91.6.1-8.54.1 MozillaThunderbird-debuginfo-91.6.1-8.54.1 MozillaThunderbird-debugsource-91.6.1-8.54.1 MozillaThunderbird-translations-common-91.6.1-8.54.1 MozillaThunderbird-translations-other-91.6.1-8.54.1

References

#1195682 #1196072

Cross- CVE-2022-0566 CVE-2022-22753 CVE-2022-22754

CVE-2022-22756 CVE-2022-22759 CVE-2022-22760

CVE-2022-22761 CVE-2022-22763 CVE-2022-22764

Affected Products:

SUSE Linux Enterprise Desktop 15-SP3

SUSE Linux Enterprise Server 15-SP3

SUSE Linux Enterprise Server for SAP Applications 15-SP3

SUSE Linux Enterprise Workstation Extension 15-SP3

https://www.suse.com/security/cve/CVE-2022-0566.html

https://www.suse.com/security/cve/CVE-2022-22753.html

https://www.suse.com/security/cve/CVE-2022-22754.html

https://www.suse.com/security/cve/CVE-2022-22756.html

https://www.suse.com/security/cve/CVE-2022-22759.html

https://www.suse.com/security/cve/CVE-2022-22760.html

https://www.suse.com/security/cve/CVE-2022-22761.html

https://www.suse.com/security/cve/CVE-2022-22763.html

https://www.suse.com/security/cve/CVE-2022-22764.html

https://bugzilla.suse.com/1195682

https://bugzilla.suse.com/1196072

Severity
Announcement ID: SUSE-SU-2022:0559-1
Rating: important

Related News