Mailinglist Archive: opensuse-updates (74 mails)

< Previous Next >
openSUSE-SU-2013:1495-1: moderate: update for MozillaThunderbird
openSUSE Security Update: update for MozillaThunderbird
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1495-1
Rating: moderate
References: #840485
Cross-References: CVE-2013-1718 CVE-2013-1719 CVE-2013-1720
CVE-2013-1722 CVE-2013-1723 CVE-2013-1724
CVE-2013-1725 CVE-2013-1728 CVE-2013-1730
CVE-2013-1732 CVE-2013-1735 CVE-2013-1736
CVE-2013-1737 CVE-2013-1738
Affected Products:
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________

An update that fixes 14 vulnerabilities is now available.

Description:

This MozillaThunderbird update to version 24.0 fixes
several security and non-security issues:

- update to Thunderbird 24.0 (bnc#840485)
* MFSA 2013-76/CVE-2013-1718/CVE-2013-1719 Miscellaneous
memory safety hazards
* MFSA 2013-77/CVE-2013-1720 (bmo#888820) Improper state
in HTML5 Tree Builder with templates
* MFSA 2013-79/CVE-2013-1722 (bmo#893308) Use-after-free
in Animation Manager during stylesheet cloning
* MFSA 2013-80/CVE-2013-1723 (bmo#891292) NativeKey
continues handling key messages after widget is
destroyed
* MFSA 2013-81/CVE-2013-1724 (bmo#894137) Use-after-free
with select element
* MFSA 2013-82/CVE-2013-1725 (bmo#876762) Calling scope
for new Javascript objects can lead to memory corruption
* MFSA 2013-85/CVE-2013-1728 (bmo#883686) Uninitialized
data in IonMonkey
* MFSA 2013-88/CVE-2013-1730 (bmo#851353) Compartment
mismatch re-attaching XBL-backed nodes
* MFSA 2013-89/CVE-2013-1732 (bmo#883514) Buffer overflow
with multi-column, lists, and floats
* MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871,
bmo#906301) Memory corruption involving scrolling
* MFSA 2013-91/CVE-2013-1737 (bmo#907727) User-defined
properties on DOM proxies get the wrong "this" object
* MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897) GC
hazard with default compartments and frame chain
restoration
- moved greek to common translation package
- require NSPR 4.10 and NSS 3.15.1
- add GStreamer build requirements for Gecko
- added enigmail-build.patch to fix TB packaging
(bmo#886095)
- removed obsolete patches:
* enigmail-old-gcc.patch
* mozilla-gcc43-enums.patch
* mozilla-gcc43-template_hacks.patch
* mozilla-gcc43-templates_instantiation.patch
* ppc-xpcshell.patch


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-719

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-719

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

MozillaThunderbird-24.0-61.25.2
MozillaThunderbird-buildsymbols-24.0-61.25.2
MozillaThunderbird-debuginfo-24.0-61.25.2
MozillaThunderbird-debugsource-24.0-61.25.2
MozillaThunderbird-devel-24.0-61.25.2
MozillaThunderbird-translations-common-24.0-61.25.2
MozillaThunderbird-translations-other-24.0-61.25.2
enigmail-1.5.2+24.0-61.25.2
enigmail-debuginfo-1.5.2+24.0-61.25.2

- openSUSE 12.2 (i586 x86_64):

MozillaThunderbird-24.0-49.55.1
MozillaThunderbird-buildsymbols-24.0-49.55.1
MozillaThunderbird-debuginfo-24.0-49.55.1
MozillaThunderbird-debugsource-24.0-49.55.1
MozillaThunderbird-devel-24.0-49.55.1
MozillaThunderbird-translations-common-24.0-49.55.1
MozillaThunderbird-translations-other-24.0-49.55.1
enigmail-1.5.2+24.0-49.55.1


References:

http://support.novell.com/security/cve/CVE-2013-1718.html
http://support.novell.com/security/cve/CVE-2013-1719.html
http://support.novell.com/security/cve/CVE-2013-1720.html
http://support.novell.com/security/cve/CVE-2013-1722.html
http://support.novell.com/security/cve/CVE-2013-1723.html
http://support.novell.com/security/cve/CVE-2013-1724.html
http://support.novell.com/security/cve/CVE-2013-1725.html
http://support.novell.com/security/cve/CVE-2013-1728.html
http://support.novell.com/security/cve/CVE-2013-1730.html
http://support.novell.com/security/cve/CVE-2013-1732.html
http://support.novell.com/security/cve/CVE-2013-1735.html
http://support.novell.com/security/cve/CVE-2013-1736.html
http://support.novell.com/security/cve/CVE-2013-1737.html
http://support.novell.com/security/cve/CVE-2013-1738.html
https://bugzilla.novell.com/840485


< Previous Next >
This Thread
  • No further messages