openSUSE-SU-2020:0643-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:0643-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2020:0643-1
Related
Published
2020-05-09T22:21:15Z
Modified
2020-05-09T22:21:15Z
Summary
Security update for MozillaThunderbird
Details

This update for MozillaThunderbird fixes the following issues: - Update to 68.8.0 ESR MFSA 2020-18 (bsc#1171186) * CVE-2020-12397 (bmo#1617370) Sender Email Address Spoofing using encoded Unicode characters * CVE-2020-12387 (bmo#1545345) Use-after-free during worker shutdown * CVE-2020-6831 (bmo#1632241) Buffer overflow in SCTP chunk input validation * CVE-2020-12392 (bmo#1614468) Arbitrary local file access with 'Copy as cURL' * CVE-2020-12393 (bmo#1615471) Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508) Memory safety bugs fixed in Thunderbird 68.8.0

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.1 / MozillaThunderbird

Package

Name
MozillaThunderbird
Purl
purl:rpm/suse/MozillaThunderbird&distro=openSUSE%20Leap%2015.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.8.0-lp151.2.38.2

Ecosystem specific

{
    "binaries": [
        {
            "MozillaThunderbird": "68.8.0-lp151.2.38.2",
            "MozillaThunderbird-translations-other": "68.8.0-lp151.2.38.2",
            "MozillaThunderbird-translations-common": "68.8.0-lp151.2.38.2"
        }
    ]
}