Mailinglist Archive: opensuse-updates (164 mails)

< Previous Next >
openSUSE-SU-2016:3308-1: moderate: Security update for MozillaThunderbird
openSUSE Security Update: Security update for MozillaThunderbird

Announcement ID: openSUSE-SU-2016:3308-1
Rating: moderate
References: #1015422
Cross-References: CVE-2016-9893 CVE-2016-9895 CVE-2016-9897
CVE-2016-9898 CVE-2016-9899 CVE-2016-9900
CVE-2016-9904 CVE-2016-9905
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12

An update that fixes 8 vulnerabilities is now available.


This update to Mozilla Thunderbird 45.6.0 fixes security issues and bugs.

In general, these flaws cannot be exploited through email in Thunderbird
because scripting is disabled when reading mail, but are potentially risks
in browser or browser-like contexts.

The following vulnerabilities were fixed: (boo#1015422)

- CVE-2016-9899: Use-after-free while manipulating DOM events and audio
- CVE-2016-9895: CSP bypass using marquee tag
- CVE-2016-9897: Memory corruption in libGLES
- CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
- CVE-2016-9900: Restricted external resources can be loaded by SVG images
through data URLs
- CVE-2016-9904: Cross-origin information leak in shared atoms
- CVE-2016-9905: Crash in EnumerateSubDocuments
- CVE-2016-9893: Memory safety bugs fixed in Thunderbird 45.6

The following bugs were fixed:

- The system integration dialog was shown every time when starting

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2016-1531=1

To bring your system up-to-date, use "zypper patch".

Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 s390x x86_64):


- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):



< Previous Next >
This Thread
  • No further messages