openSUSE-SU-2022:0058-1: important: Security update for MozillaThunderbird
openSUSE Security Update: Security update for MozillaThunderbird ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:0058-1 Rating: important References: #1144018 #1181400 #1194020 #1194215 #1194681 Cross-References: CVE-2020-15803 CVE-2021-27927 CVE-2021-4126 CVE-2021-44538 CVE-2022-23134 CVSS scores: CVE-2020-15803 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVE-2020-15803 (SUSE): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N CVE-2021-4126 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2021-44538 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2022-23134 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-23134 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: openSUSE Backports SLE-15-SP3 openSUSE Leap 15.3 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for MozillaThunderbird fixes the following issues: - Mozilla Thunderbird 91.4.1 - CVE-2021-4126: OpenPGP signature status doesn't consider additional message content. (bsc#1194215) - CVE-2021-44538: Matrix chat library libolm bundled with Thunderbird vulnerable to a buffer overflow. (bsc#1194020) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-58=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2022-58=1 Package List: - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): MozillaThunderbird-91.4.1-8.48.1 MozillaThunderbird-debuginfo-91.4.1-8.48.1 MozillaThunderbird-debugsource-91.4.1-8.48.1 MozillaThunderbird-translations-common-91.4.1-8.48.1 MozillaThunderbird-translations-other-91.4.1-8.48.1 - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64): zabbix-agent-4.0.38-bp153.2.3.1 zabbix-java-gateway-4.0.38-bp153.2.3.1 zabbix-phpfrontend-4.0.38-bp153.2.3.1 zabbix-proxy-4.0.38-bp153.2.3.1 zabbix-proxy-mysql-4.0.38-bp153.2.3.1 zabbix-proxy-postgresql-4.0.38-bp153.2.3.1 zabbix-proxy-sqlite-4.0.38-bp153.2.3.1 zabbix-server-4.0.38-bp153.2.3.1 zabbix-server-mysql-4.0.38-bp153.2.3.1 zabbix-server-postgresql-4.0.38-bp153.2.3.1 References: https://www.suse.com/security/cve/CVE-2020-15803.html https://www.suse.com/security/cve/CVE-2021-27927.html https://www.suse.com/security/cve/CVE-2021-4126.html https://www.suse.com/security/cve/CVE-2021-44538.html https://www.suse.com/security/cve/CVE-2022-23134.html https://bugzilla.suse.com/1144018 https://bugzilla.suse.com/1181400 https://bugzilla.suse.com/1194020 https://bugzilla.suse.com/1194215 https://bugzilla.suse.com/1194681
participants (1)
-
opensuse-security@opensuse.org