openSUSE Security Update: Security update for MozillaThunderbird ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:0544-1 Rating: important References: #1168630 #1168874 Cross-References: CVE-2020-6819 CVE-2020-6820 CVE-2020-6821 CVE-2020-6822 CVE-2020-6825 Affected Products: openSUSE Leap 15.1 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for MozillaThunderbird to version 68.7.0 fixes the following issues: - CVE-2020-6819: Use-after-free while running the nsDocShell destructor (boo#1168630) - CVE-2020-6820: Use-after-free when handling a ReadableStream (boo#1168630) - CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage() (boo#1168874) - CVE-2020-6822: Out of bounds write in GMPDecodeData when processing large images (boo#1168874) - CVE-2020-6825: Memory safety bugs fixed (boo#1168874) This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2020-544=1 Package List: - openSUSE Leap 15.1 (x86_64): MozillaThunderbird-68.7.0-lp151.2.35.1 MozillaThunderbird-debuginfo-68.7.0-lp151.2.35.1 MozillaThunderbird-debugsource-68.7.0-lp151.2.35.1 MozillaThunderbird-translations-common-68.7.0-lp151.2.35.1 MozillaThunderbird-translations-other-68.7.0-lp151.2.35.1 References: https://www.suse.com/security/cve/CVE-2020-6819.html https://www.suse.com/security/cve/CVE-2020-6820.html https://www.suse.com/security/cve/CVE-2020-6821.html https://www.suse.com/security/cve/CVE-2020-6822.html https://www.suse.com/security/cve/CVE-2020-6825.html https://bugzilla.suse.com/1168630 https://bugzilla.suse.com/1168874