openSUSE-SU-2016:3307-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2016:3307-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2016:3307-1
Related
Published
2016-12-30T17:01:32Z
Modified
2016-12-30T17:01:32Z
Summary
Security update for MozillaThunderbird
Details

This update to Mozilla Thunderbird 45.6.0 fixes security issues and bugs.

In general, these flaws cannot be exploited through email in Thunderbird because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

The following vulnerabilities were fixed: (boo#1015422)

  • CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
  • CVE-2016-9895: CSP bypass using marquee tag
  • CVE-2016-9897: Memory corruption in libGLES
  • CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
  • CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
  • CVE-2016-9904: Cross-origin information leak in shared atoms
  • CVE-2016-9905: Crash in EnumerateSubDocuments
  • CVE-2016-9893: Memory safety bugs fixed in Thunderbird 45.6

The following bugs were fixed:

  • The system integration dialog was shown every time when starting Thunderbird
References

Affected packages

SUSE:Package Hub 12 / MozillaThunderbird

Package

Name
MozillaThunderbird
Purl
purl:rpm/suse/MozillaThunderbird&distro=SUSE%20Package%20Hub%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
45.6.0-20.1

Ecosystem specific

{
    "binaries": [
        {
            "MozillaThunderbird-buildsymbols": "45.6.0-20.1",
            "MozillaThunderbird": "45.6.0-20.1",
            "MozillaThunderbird-devel": "45.6.0-20.1",
            "MozillaThunderbird-translations-common": "45.6.0-20.1",
            "MozillaThunderbird-translations-other": "45.6.0-20.1"
        }
    ]
}