Advisories


   openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0580-1
Rating:             important
References:         #1177542 #1183942 #1184536 
Cross-References:   CVE-2021-23981 CVE-2021-23982 CVE-2021-23984
                    CVE-2021-23987 CVE-2021-23991 CVE-2021-23992
                    CVE-2021-23993
CVSS scores:
                    CVE-2021-23981 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2021-23981 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23982 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2021-23982 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-23984 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2021-23984 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-23987 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23987 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23991 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2021-23992 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2021-23993 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for MozillaThunderbird fixes the following issues:

   - Mozilla Thunderbird was updated to version 78.9.1 (MFSA 2021-12,MFSA
     2021-13, bsc#1183942, bsc#1184536)
     * CVE-2021-23981: Texture upload into an unbound backing buffer resulted
       in an out-of-bound read
     * CVE-2021-23982: Internal network hosts could have been probed by a
       malicious webpage
     * CVE-2021-23984: Malicious extensions could have spoofed popup
       information
     * CVE-2021-23987: Memory safety bugs
     * CVE-2021-23991: An attacker may use Thunderbird's OpenPGP key refresh
       mechanism to poison an existing key
     * CVE-2021-23992: A crafted OpenPGP key with an invalid user ID could be
       used to confuse the user
     * CVE-2021-23993: Inability to send encrypted OpenPGP email after
       importing a crafted OpenPGP key
   - cleaned up and fixed mozilla.sh.in for wayland (bsc#1177542)

   This update was imported from the SUSE:SLE-15-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-580=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      MozillaThunderbird-78.9.1-lp152.2.38.1
      MozillaThunderbird-debuginfo-78.9.1-lp152.2.38.1
      MozillaThunderbird-debugsource-78.9.1-lp152.2.38.1
      MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1
      MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1


References:

   https://www.suse.com/security/cve/CVE-2021-23981.html
   https://www.suse.com/security/cve/CVE-2021-23982.html
   https://www.suse.com/security/cve/CVE-2021-23984.html
   https://www.suse.com/security/cve/CVE-2021-23987.html
   https://www.suse.com/security/cve/CVE-2021-23991.html
   https://www.suse.com/security/cve/CVE-2021-23992.html
   https://www.suse.com/security/cve/CVE-2021-23993.html
   https://bugzilla.suse.com/1177542
   https://bugzilla.suse.com/1183942
   https://bugzilla.suse.com/1184536

Warning: getimagesize(/images/distros-large/opensuse-large.png): failed to open stream: No such file or directory in /var/www/webstage.linuxsecurity.com-443/html/templates/newsberg/html/com_content/article/default.php on line 107

Warning: Division by zero in /var/www/webstage.linuxsecurity.com-443/html/templates/newsberg/html/com_content/article/default.php on line 110

openSUSE: 2021:0580-1 important: MozillaThunderbird

An update that fixes 7 vulnerabilities is now available.

   openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0580-1
Rating:             important
References:         #1177542 #1183942 #1184536 
Cross-References:   CVE-2021-23981 CVE-2021-23982 CVE-2021-23984
                    CVE-2021-23987 CVE-2021-23991 CVE-2021-23992
                    CVE-2021-23993
CVSS scores:
                    CVE-2021-23981 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2021-23981 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23982 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2021-23982 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-23984 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2021-23984 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-23987 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23987 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-23991 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2021-23992 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2021-23993 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for MozillaThunderbird fixes the following issues:

   - Mozilla Thunderbird was updated to version 78.9.1 (MFSA 2021-12,MFSA
     2021-13, bsc#1183942, bsc#1184536)
     * CVE-2021-23981: Texture upload into an unbound backing buffer resulted
       in an out-of-bound read
     * CVE-2021-23982: Internal network hosts could have been probed by a
       malicious webpage
     * CVE-2021-23984: Malicious extensions could have spoofed popup
       information
     * CVE-2021-23987: Memory safety bugs
     * CVE-2021-23991: An attacker may use Thunderbird's OpenPGP key refresh
       mechanism to poison an existing key
     * CVE-2021-23992: A crafted OpenPGP key with an invalid user ID could be
       used to confuse the user
     * CVE-2021-23993: Inability to send encrypted OpenPGP email after
       importing a crafted OpenPGP key
   - cleaned up and fixed mozilla.sh.in for wayland (bsc#1177542)

   This update was imported from the SUSE:SLE-15-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-580=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      MozillaThunderbird-78.9.1-lp152.2.38.1
      MozillaThunderbird-debuginfo-78.9.1-lp152.2.38.1
      MozillaThunderbird-debugsource-78.9.1-lp152.2.38.1
      MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1
      MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1


References:

   https://www.suse.com/security/cve/CVE-2021-23981.html
   https://www.suse.com/security/cve/CVE-2021-23982.html
   https://www.suse.com/security/cve/CVE-2021-23984.html
   https://www.suse.com/security/cve/CVE-2021-23987.html
   https://www.suse.com/security/cve/CVE-2021-23991.html
   https://www.suse.com/security/cve/CVE-2021-23992.html
   https://www.suse.com/security/cve/CVE-2021-23993.html
   https://bugzilla.suse.com/1177542
   https://bugzilla.suse.com/1183942
   https://bugzilla.suse.com/1184536

Print  

openSUSE: 2021:0580-1 important: MozillaThunderbird

April 19, 2021
An update that fixes 7 vulnerabilities is now available.

Summary

- Mozilla Thunderbird was updated to version 78.9.1 (MFSA 2021-12,MFSA 2021-13, bsc#1183942, bsc#1184536) * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage * CVE-2021-23984: Malicious extensions could have spoofed popup information * CVE-2021-23987: Memory safety bugs * CVE-2021-23991: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key * CVE-2021-23992: A crafted OpenPGP key with an invalid user ID could be used to confuse the user * CVE-2021-23993: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key - cleaned up and fixed mozilla.sh.in for wayland (bsc#1177542) This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-580=1

List

Package List: - openSUSE Leap 15.2 (x86_64): MozillaThunderbird-78.9.1-lp152.2.38.1 MozillaThunderbird-debuginfo-78.9.1-lp152.2.38.1 MozillaThunderbird-debugsource-78.9.1-lp152.2.38.1 MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1
Severity
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0580-1
Rating: important
References: #1177542 #1183942 #1184536
Cross-References: CVE-2021-23981 CVE-2021-23982 CVE-2021-23984
CVE-2021-23987 CVE-2021-23991 CVE-2021-23992
CVE-2021-23993
CVSS scores:
CVE-2021-23981 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVE-2021-23981 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-23982 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-23982 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2021-23984 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-23984 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2021-23987 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-23987 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-23991 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-23992 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-23993 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Leap 15.2

References

References: https://www.suse.com/security/cve/CVE-2021-23981.html https://www.suse.com/security/cve/CVE-2021-23982.html https://www.suse.com/security/cve/CVE-2021-23984.html https://www.suse.com/security/cve/CVE-2021-23987.html https://www.suse.com/security/cve/CVE-2021-23991.html https://www.suse.com/security/cve/CVE-2021-23992.html https://www.suse.com/security/cve/CVE-2021-23993.html https://bugzilla.suse.com/1177542 https://bugzilla.suse.com/1183942 https://bugzilla.suse.com/1184536

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.