SUSE-SU-2020:1225-1

Source
https://www.suse.com/support/update/announcement/2020/suse-su-20201225-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:1225-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2020:1225-1
Related
Published
2020-05-08T08:48:22Z
Modified
2020-05-08T08:48:22Z
Summary
Security update for MozillaThunderbird
Details

This update for MozillaThunderbird fixes the following issues: - Update to 68.8.0 ESR MFSA 2020-18 (bsc#1171186) * CVE-2020-12397 (bmo#1617370) Sender Email Address Spoofing using encoded Unicode characters * CVE-2020-12387 (bmo#1545345) Use-after-free during worker shutdown * CVE-2020-6831 (bmo#1632241) Buffer overflow in SCTP chunk input validation * CVE-2020-12392 (bmo#1614468) Arbitrary local file access with 'Copy as cURL' * CVE-2020-12393 (bmo#1615471) Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508) Memory safety bugs fixed in Thunderbird 68.8.0

References

Affected packages

SUSE:Linux Enterprise Workstation Extension 15 SP1 / MozillaThunderbird

Package

Name
MozillaThunderbird
Purl
purl:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.8.0-3.80.2

Ecosystem specific

{
    "binaries": [
        {
            "MozillaThunderbird": "68.8.0-3.80.2",
            "MozillaThunderbird-translations-other": "68.8.0-3.80.2",
            "MozillaThunderbird-translations-common": "68.8.0-3.80.2"
        }
    ]
}