SUSE 5026 Published by

A MozillaThunderbird security update has been released for openSUSE Leap 15.3 and 15.4.



openSUSE-SU-2022:0559-1: important: Security update for MozillaThunderbird


openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID: openSUSE-SU-2022:0559-1
Rating: important
References: #1195682 #1196072
Cross-References: CVE-2022-0566 CVE-2022-22753 CVE-2022-22754
CVE-2022-22756 CVE-2022-22759 CVE-2022-22760
CVE-2022-22761 CVE-2022-22763 CVE-2022-22764

Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________

An update that fixes 9 vulnerabilities is now available.

Description:

This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 91.6.1 / MFSA 2022-07 (bsc#1196072)
* CVE-2022-0566 (bmo#1753094) Crafted email could trigger an
out-of-bounds write

- Mozilla Thunderbird 91.6 / MFSA 2022-06 (bsc#1195682)
* CVE-2022-22753 (bmo#1732435) Privilege Escalation to SYSTEM on Windows
via Maintenance Service
* CVE-2022-22754 (bmo#1750565) Extensions could have bypassed permission
confirmation during update
* CVE-2022-22756 (bmo#1317873) Drag and dropping an image could have
resulted in the dropped
object being an executable
* CVE-2022-22759 (bmo#1739957) Sandboxed iframes could have executed
script if the parent appended elements
* CVE-2022-22760 (bmo#1740985, bmo#1748503) Cross-Origin responses could
be distinguished between script and non-script content-types
* CVE-2022-22761 (bmo#1745566) frame-ancestors Content Security Policy
directive was not enforced for framed extension pages
* CVE-2022-22763 (bmo#1740534) Script Execution during invalid object
state
* CVE-2022-22764 (bmo#1742682, bmo#1744165, bmo#1746545, bmo#1748210,
bmo#1748279) Memory safety bugs fixed in Thunderbird 91.6

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.4:

zypper in -t patch openSUSE-SLE-15.4-2022-559=1

- openSUSE Leap 15.3:

zypper in -t patch openSUSE-SLE-15.3-2022-559=1


Package List:

- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

MozillaThunderbird-91.6.1-8.54.1
MozillaThunderbird-debuginfo-91.6.1-8.54.1
MozillaThunderbird-debugsource-91.6.1-8.54.1
MozillaThunderbird-translations-common-91.6.1-8.54.1
MozillaThunderbird-translations-other-91.6.1-8.54.1

- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):

MozillaThunderbird-91.6.1-8.54.1
MozillaThunderbird-debuginfo-91.6.1-8.54.1
MozillaThunderbird-debugsource-91.6.1-8.54.1
MozillaThunderbird-translations-common-91.6.1-8.54.1
MozillaThunderbird-translations-other-91.6.1-8.54.1

References:

  https://www.suse.com/security/cve/CVE-2022-0566.html
  https://www.suse.com/security/cve/CVE-2022-22753.html
  https://www.suse.com/security/cve/CVE-2022-22754.html
  https://www.suse.com/security/cve/CVE-2022-22756.html
  https://www.suse.com/security/cve/CVE-2022-22759.html
  https://www.suse.com/security/cve/CVE-2022-22760.html
  https://www.suse.com/security/cve/CVE-2022-22761.html
  https://www.suse.com/security/cve/CVE-2022-22763.html
  https://www.suse.com/security/cve/CVE-2022-22764.html
  https://bugzilla.suse.com/1195682
  https://bugzilla.suse.com/1196072