Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in MozillaThunderbird
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in MozillaThunderbird
ID: SUSE-SU-2023:3664-1
Distribution: SUSE
Plattformen: SUSE Manager Proxy 4.3, SUSE Manager Server 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Real Time 15 SP4, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Desktop 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Package Hub 15 15-SP4, SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise Workstation Extension 15 SP4, SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Desktop 15 SP5, SUSE Package Hub 15 15-SP5, SUSE Linux Enterprise Workstation Extension 15 SP5, SUSE Linux Enterprise Micro 5.5, SUSE openSUSE Leap 15.5, SUSE openSUSE Leap 15.4
Datum: Mo, 18. September 2023, 22:43
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4582
Applikationen: Mozilla Thunderbird

Originalnachricht

--===============4481070378680900808==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for MozillaThunderbird

Announcement ID: SUSE-SU-2023:3664-1
Rating: critical
References:

* #1214606
* #1215231
* #1215245


Cross-References:

* CVE-2023-4051
* CVE-2023-4053
* CVE-2023-4573
* CVE-2023-4574
* CVE-2023-4575
* CVE-2023-4576
* CVE-2023-4577
* CVE-2023-4578
* CVE-2023-4580
* CVE-2023-4581
* CVE-2023-4582
* CVE-2023-4583
* CVE-2023-4584
* CVE-2023-4585
* CVE-2023-4863


CVSS scores:

* CVE-2023-4051 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-4053 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2023-4573 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-4574 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-4575 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-4576 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-4577 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-4578 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-4580 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2023-4581 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2023-4582 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4583 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-4584 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4585 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4863 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4863 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H


Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP4
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5



An update that solves 15 vulnerabilities can now be installed.

## Description:

This update for MozillaThunderbird fixes the following issues:

Security fixes:

* Mozilla Thunderbird 115.2.2 (MFSA 2023-40, bsc#1215245)
* CVE-2023-4863: Fixed heap buffer overflow in libwebp (bmo#1852649).

* Mozilla Thunderbird 115.2 (MFSA 2023-38, bsc#1214606)

* CVE-2023-4573: Memory corruption in IPC CanvasTranslator (bmo#1846687)
* CVE-2023-4574: Memory corruption in IPC ColorPickerShownCallback
(bmo#1846688)
* CVE-2023-4575: Memory corruption in IPC FilePickerShownCallback
(bmo#1846689)
* CVE-2023-4576: Integer Overflow in RecordedSourceSurfaceCreation
(bmo#1846694)
* CVE-2023-4577: Memory corruption in JIT UpdateRegExpStatics (bmo#1847397)
* CVE-2023-4051: Full screen notification obscured by file open dialog
(bmo#1821884)
* CVE-2023-4578: Error reporting methods in SpiderMonkey could have triggered
an Out of Memory Exception (bmo#1839007)
* CVE-2023-4053: Full screen notification obscured by external program
(bmo#1839079)
* CVE-2023-4580: Push notifications saved to disk unencrypted (bmo#1843046)
* CVE-2023-4581: XLL file extensions were downloadable without warnings
(bmo#1843758)
* CVE-2023-4582: Buffer Overflow in WebGL glGetProgramiv (bmo#1773874)
* CVE-2023-4583: Browsing Context potentially not cleared when closing
Private
Window (bmo#1842030)
* CVE-2023-4584: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15,
Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (bmo#1843968,
bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529)
* CVE-2023-4585: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2,
and Thunderbird 115.2 (bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904,
bmo#1848999)

Other fixes:

Mozilla Thunderbird 115.2.1 * new: Column separators are now shown between all
columns in tree view (bmo#1847441) * fixed: Crash reporter did not work in
Thunderbird Flatpak (bmo#1843102) * fixed: New mail notification always opened
message in message pane, even if pane was disabled (bmo#1840092) * fixed: After
moving an IMAP message to another folder, the incorrect message was selected in
the message list (bmo#1845376) * fixed: Adding a tag to an IMAP message opened
in a tab failed (bmo#1844452) * fixed: Junk/Spam folders were not always shown
in Unified Folders mode (bmo#1838672) * fixed: Middle-clicking a folder or
message did not open it in a background tab, as in previous versions
(bmo#1842482) * fixed: Settings tab visual improvements: Advanced Fonts dialog,
Section headers hidden behind search box (bmo#1717382,bmo#1846751) * fixed:
Various visual and style fixes (bmo#1843707,bmo#1849823)

Mozilla Thunderbird 115.2 * new: Thunderbird MSIX packages are now published on
archive.mozilla.org (bmo#1817657) * changed: Size, Unread, and Total columns
are
now right- aligned (bmo#1848604) * changed: Newsgroup names in message list
header are now abbreviated (bmo#1833298) * fixed: Message compose window did
not
apply theme colors to menus (bmo#1845699) * fixed: Reading the second new
message in a folder cleared the unread indicator of all other new messages
(bmo#1839805) * fixed: Displayed counts of unread or flagged messages could
become out-of-sync (bmo#1846860) * fixed: Deleting a message from the context
menu with messages sorted in chronological order and smooth scroll enabled
caused message list to scroll to top (bmo#1843462) * fixed: Repeatedly
switching
accounts in Subscribe dialog caused tree view to stop updating (bmo#1845593) *
fixed: "Ignore thread" caused message cards to display incorrectly in
message
list (bmo#1847966) * fixed: Creating tags from unified toolbar failed
(bmo#1846336) * fixed: Cross-folder navigation using F and N did not work
(bmo#1845011) * fixed: Account Manager did not resize to fit content, causing
"Close" button to become hidden outside bounds of dialog when too many
accounts
were listed (bmo#1847555) * fixed: Remote content exceptions could not be added
in Settings (bmo#1847576) * fixed: Newsgroup list file did not get updated
after
adding a new NNTP server (bmo#1845464) * fixed: "Download all headers"
option in
NNTP "Download Headers" dialog was incorrectly selected by default
(bmo#1845457)
* fixed: "Convert to event/task" was missing from mail context menu
(bmo#1817705) * fixed: Events and tasks were not shown in some cases despite
being present on remote server (bmo#1827100) * fixed: Various visual and UX
improvements (bmo#1844244,bmo#1845645)

* Mozilla Thunderbird 115.1.1
* fixed: Some HTML emails printed headers on first page and message on
subsequent pages (bmo#1843628)
* fixed: Deleting messages from message list sometimes scrolled list to
bottom, selecting bottommost message (bmo#1835173)
* fixed: Width of icon columns (like Junk or Starred) in message list did not
adjust when UI density was changed (bmo#1843014)
* fixed: Old OpenPGP secret keys could not be used to decrypt messages under
certain circumstances (bmo#1835786)
* fixed: When multiple folder modes were active, tab focus navigated through
all folder mode options before reaching message list (bmo#1842060)
* fixed: Unread message count badge was not displayed on parent folders of
subfolder containing unread messages (bmo#1844534)
* fixed: "Undo archive" (via Ctrl-Z) did not un-archive previously
archived
messages (bmo#1829340)
* fixed: "New" button dropdown menu in "Message Filters"
dialog could not be
opened via keyboard navigation (bmo#1843511)
* fixed: "Show New Mail Alert for" input field in "Customize New
Mail Alert"
dialog had zero width when using certain language packs (bmo#1845832)
* fixed: "Account Wizard" dialog was too narrow when adding a news
server,
partially hiding confirmation buttons (bmo#1846588)
* fixed: Link Properties and Image Properties dialogs in the composer were
too
wide (bmo#1816850)
* fixed: Thunderbird version number and details in "About" dialog
were not
automatically read by screen readers when first opening dialog
(bmo#1847078)
* fixed: Flatpak improvements and bug fixes
(bmo#1825399,bmo#1843094,bmo#1843097)
* fixed: Various visual and UX improvements (bmo#1846262)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2023-3664=1

* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3664=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3664=1

* SUSE Package Hub 15 15-SP4
zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3664=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3664=1

* SUSE Linux Enterprise Workstation Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2023-3664=1

## Package List:

* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-common-115.2.2-150200.8.130.1
* MozillaThunderbird-115.2.2-150200.8.130.1
* MozillaThunderbird-debugsource-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-other-115.2.2-150200.8.130.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-common-115.2.2-150200.8.130.1
* MozillaThunderbird-115.2.2-150200.8.130.1
* MozillaThunderbird-debugsource-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-other-115.2.2-150200.8.130.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-common-115.2.2-150200.8.130.1
* MozillaThunderbird-115.2.2-150200.8.130.1
* MozillaThunderbird-debugsource-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-other-115.2.2-150200.8.130.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x)
* MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-common-115.2.2-150200.8.130.1
* MozillaThunderbird-115.2.2-150200.8.130.1
* MozillaThunderbird-debugsource-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-other-115.2.2-150200.8.130.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-common-115.2.2-150200.8.130.1
* MozillaThunderbird-115.2.2-150200.8.130.1
* MozillaThunderbird-debugsource-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-other-115.2.2-150200.8.130.1
* SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64)
* MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-common-115.2.2-150200.8.130.1
* MozillaThunderbird-115.2.2-150200.8.130.1
* MozillaThunderbird-debugsource-115.2.2-150200.8.130.1
* MozillaThunderbird-translations-other-115.2.2-150200.8.130.1

## References:

* https://www.suse.com/security/cve/CVE-2023-4051.html
* https://www.suse.com/security/cve/CVE-2023-4053.html
* https://www.suse.com/security/cve/CVE-2023-4573.html
* https://www.suse.com/security/cve/CVE-2023-4574.html
* https://www.suse.com/security/cve/CVE-2023-4575.html
* https://www.suse.com/security/cve/CVE-2023-4576.html
* https://www.suse.com/security/cve/CVE-2023-4577.html
* https://www.suse.com/security/cve/CVE-2023-4578.html
* https://www.suse.com/security/cve/CVE-2023-4580.html
* https://www.suse.com/security/cve/CVE-2023-4581.html
* https://www.suse.com/security/cve/CVE-2023-4582.html
* https://www.suse.com/security/cve/CVE-2023-4583.html
* https://www.suse.com/security/cve/CVE-2023-4584.html
* https://www.suse.com/security/cve/CVE-2023-4585.html
* https://www.suse.com/security/cve/CVE-2023-4863.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214606
* https://bugzilla.suse.com/show_bug.cgi?id=1215231
* https://bugzilla.suse.com/show_bug.cgi?id=1215245


--===============4481070378680900808==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for MozillaThunderbird</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:3664-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>critical</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214606">#1214606</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215231">#1215231</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215245">#1215245</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4051.html">CVE-2023-4051</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4053.html">CVE-2023-4053</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4573.html">CVE-2023-4573</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4574.html">CVE-2023-4574</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4575.html">CVE-2023-4575</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4576.html">CVE-2023-4576</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4577.html">CVE-2023-4577</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4578.html">CVE-2023-4578</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4580.html">CVE-2023-4580</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4581.html">CVE-2023-4581</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4582.html">CVE-2023-4582</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4583.html">CVE-2023-4583</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4584.html">CVE-2023-4584</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4585.html">CVE-2023-4585</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4863.html">CVE-2023-4863</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4051</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4053</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4573</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4574</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4575</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4576</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4577</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4578</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4580</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4581</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4582</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4583</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4584</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4585</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.4</li>

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.3</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Workstation Extension 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Workstation Extension 15 SP5</li>

<li class="list-group-item">SUSE Manager
Proxy 4.3</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.3</li>

<li class="list-group-item">SUSE Manager
Server 4.3</li>

<li class="list-group-item">SUSE Package
Hub 15 15-SP4</li>

<li class="list-group-item">SUSE Package
Hub 15 15-SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 15 vulnerabilities can now be
installed.</p>





<h2>Description:</h2>

<p>This update for MozillaThunderbird fixes the following
issues:</p>
<p>Security fixes:</p>
<ul>
<li>Mozilla Thunderbird 115.2.2 (MFSA 2023-40, bsc#1215245)</li>
<li>
<p>CVE-2023-4863: Fixed heap buffer overflow in libwebp
(bmo#1852649).</p>
</li>
<li>
<p>Mozilla Thunderbird 115.2 (MFSA 2023-38, bsc#1214606)</p>
</li>
<li>CVE-2023-4573: Memory corruption in IPC CanvasTranslator
(bmo#1846687) </li>
<li>CVE-2023-4574: Memory corruption in IPC ColorPickerShownCallback
(bmo#1846688) </li>
<li>CVE-2023-4575: Memory corruption in IPC FilePickerShownCallback
(bmo#1846689) </li>
<li>CVE-2023-4576: Integer Overflow in RecordedSourceSurfaceCreation
(bmo#1846694) </li>
<li>CVE-2023-4577: Memory corruption in JIT UpdateRegExpStatics
(bmo#1847397) </li>
<li>CVE-2023-4051: Full screen notification obscured by file open dialog
(bmo#1821884) </li>
<li>CVE-2023-4578: Error reporting methods in SpiderMonkey could have
triggered an Out of Memory Exception (bmo#1839007) </li>
<li>CVE-2023-4053: Full screen notification obscured by external program
(bmo#1839079) </li>
<li>CVE-2023-4580: Push notifications saved to disk unencrypted
(bmo#1843046) </li>
<li>CVE-2023-4581: XLL file extensions were downloadable without warnings
(bmo#1843758) </li>
<li>CVE-2023-4582: Buffer Overflow in WebGL glGetProgramiv (bmo#1773874)
</li>
<li>CVE-2023-4583: Browsing Context potentially not cleared when closing
Private Window (bmo#1842030) </li>
<li>CVE-2023-4584: Memory safety bugs fixed in Firefox 117, Firefox ESR
102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529) </li>
<li>CVE-2023-4585: Memory safety bugs fixed in Firefox 117, Firefox ESR
115.2, and Thunderbird 115.2 (bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904, bmo#1848999) </li>
</ul>
<p>Other fixes:</p>
<p>Mozilla Thunderbird 115.2.1
* new: Column separators are now shown between all columns in
tree view (bmo#1847441)
* fixed: Crash reporter did not work in Thunderbird Flatpak
(bmo#1843102)
* fixed: New mail notification always opened message in message
pane, even if pane was disabled (bmo#1840092)
* fixed: After moving an IMAP message to another folder, the
incorrect message was selected in the message list
(bmo#1845376)
* fixed: Adding a tag to an IMAP message opened in a tab failed
(bmo#1844452)
* fixed: Junk/Spam folders were not always shown in Unified
Folders mode (bmo#1838672)
* fixed: Middle-clicking a folder or message did not open it in
a background tab, as in previous versions (bmo#1842482)
* fixed: Settings tab visual improvements: Advanced Fonts
dialog, Section headers hidden behind search box
(bmo#1717382,bmo#1846751)
* fixed: Various visual and style fixes
(bmo#1843707,bmo#1849823)</p>
<p>Mozilla Thunderbird 115.2
* new: Thunderbird MSIX packages are now published on
archive.mozilla.org (bmo#1817657)
* changed: Size, Unread, and Total columns are now right-
aligned (bmo#1848604)
* changed: Newsgroup names in message list header are now
abbreviated (bmo#1833298)
* fixed: Message compose window did not apply theme colors to
menus (bmo#1845699)
* fixed: Reading the second new message in a folder cleared the
unread indicator of all other new messages (bmo#1839805)
* fixed: Displayed counts of unread or flagged messages could
become out-of-sync (bmo#1846860)
* fixed: Deleting a message from the context menu with messages
sorted in chronological order and smooth scroll enabled
caused message list to scroll to top (bmo#1843462)
* fixed: Repeatedly switching accounts in Subscribe dialog
caused tree view to stop updating (bmo#1845593)
* fixed: &quot;Ignore thread&quot; caused message cards to display
incorrectly in message list (bmo#1847966)
* fixed: Creating tags from unified toolbar failed
(bmo#1846336)
* fixed: Cross-folder navigation using F and N did not work
(bmo#1845011)
* fixed: Account Manager did not resize to fit content, causing
&quot;Close&quot; button to become hidden outside bounds of dialog
when
too many accounts were listed (bmo#1847555)
* fixed: Remote content exceptions could not be added in
Settings (bmo#1847576)
* fixed: Newsgroup list file did not get updated after adding a
new NNTP server (bmo#1845464)
* fixed: &quot;Download all headers&quot; option in NNTP
&quot;Download
Headers&quot; dialog was incorrectly selected by default
(bmo#1845457)
* fixed: &quot;Convert to event/task&quot; was missing from mail
context
menu (bmo#1817705)
* fixed: Events and tasks were not shown in some cases despite
being present on remote server (bmo#1827100)
* fixed: Various visual and UX improvements
(bmo#1844244,bmo#1845645)</p>
<ul>
<li>Mozilla Thunderbird 115.1.1</li>
<li>fixed: Some HTML emails printed headers on first page and
message on subsequent pages (bmo#1843628)</li>
<li>fixed: Deleting messages from message list sometimes scrolled
list to bottom, selecting bottommost message (bmo#1835173)</li>
<li>fixed: Width of icon columns (like Junk or Starred) in
message list did not adjust when UI density was changed
(bmo#1843014)</li>
<li>fixed: Old OpenPGP secret keys could not be used to decrypt
messages under certain circumstances (bmo#1835786)</li>
<li>fixed: When multiple folder modes were active, tab focus
navigated through all folder mode options before reaching
message list (bmo#1842060)</li>
<li>fixed: Unread message count badge was not displayed on parent
folders of subfolder containing unread messages (bmo#1844534)</li>
<li>fixed: &quot;Undo archive&quot; (via Ctrl-Z) did not
un-archive
previously archived messages (bmo#1829340)</li>
<li>fixed: &quot;New&quot; button dropdown menu in
&quot;Message Filters&quot; dialog
could not be opened via keyboard navigation (bmo#1843511)</li>
<li>fixed: &quot;Show New Mail Alert for&quot; input field in
&quot;Customize
New Mail Alert&quot; dialog had zero width when using certain
language packs (bmo#1845832)</li>
<li>fixed: &quot;Account Wizard&quot; dialog was too narrow when
adding a
news server, partially hiding confirmation buttons
(bmo#1846588)</li>
<li>fixed: Link Properties and Image Properties dialogs in the
composer were too wide (bmo#1816850)</li>
<li>fixed: Thunderbird version number and details in
&quot;About&quot;
dialog were not automatically read by screen readers when
first opening dialog (bmo#1847078)</li>
<li>fixed: Flatpak improvements and bug fixes
(bmo#1825399,bmo#1843094,bmo#1843097)</li>
<li>fixed: Various visual and UX improvements (bmo#1846262)</li>
</ul>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 15 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-WE-15-SP5-2023-3664=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.4


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.4-2023-3664=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.5-2023-3664=1</code>



</li>

<li class="list-group-item">
SUSE Package Hub 15 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3664=1</code>



</li>

<li class="list-group-item">
SUSE Package Hub 15 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3664=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-WE-15-SP4-2023-3664=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
<ul>


<li>MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-common-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-debugsource-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-other-115.2.2-150200.8.130.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
<ul>


<li>MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-common-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-debugsource-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-other-115.2.2-150200.8.130.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-common-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-debugsource-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-other-115.2.2-150200.8.130.1</li>

</ul>
</li>



<li>
SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x)
<ul>


<li>MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-common-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-debugsource-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-other-115.2.2-150200.8.130.1</li>

</ul>
</li>



<li>
SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
<ul>


<li>MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-common-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-debugsource-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-other-115.2.2-150200.8.130.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64)
<ul>


<li>MozillaThunderbird-debuginfo-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-common-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-debugsource-115.2.2-150200.8.130.1</li>


<li>MozillaThunderbird-translations-other-115.2.2-150200.8.130.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4051.html">https://www.suse.com/security/cve/CVE-2023-4051.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4053.html">https://www.suse.com/security/cve/CVE-2023-4053.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4573.html">https://www.suse.com/security/cve/CVE-2023-4573.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4574.html">https://www.suse.com/security/cve/CVE-2023-4574.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4575.html">https://www.suse.com/security/cve/CVE-2023-4575.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4576.html">https://www.suse.com/security/cve/CVE-2023-4576.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4577.html">https://www.suse.com/security/cve/CVE-2023-4577.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4578.html">https://www.suse.com/security/cve/CVE-2023-4578.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4580.html">https://www.suse.com/security/cve/CVE-2023-4580.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4581.html">https://www.suse.com/security/cve/CVE-2023-4581.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4582.html">https://www.suse.com/security/cve/CVE-2023-4582.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4583.html">https://www.suse.com/security/cve/CVE-2023-4583.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4584.html">https://www.suse.com/security/cve/CVE-2023-4584.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4585.html">https://www.suse.com/security/cve/CVE-2023-4585.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4863.html">https://www.suse.com/security/cve/CVE-2023-4863.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214606">https://bugzilla.suse.com/show_bug.cgi?id=1214606</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215231">https://bugzilla.suse.com/show_bug.cgi?id=1215231</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215245">https://bugzilla.suse.com/show_bug.cgi?id=1215245</a>
</li>


</ul>

</div>

--===============4481070378680900808==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung