opensuse-su-2017:1268-1
Vulnerability from csaf_opensuse
Published
2017-05-15 11:20
Modified
2017-05-15 11:20
Summary
Security update for MozillaThunderbird
Notes
Title of the patch
Security update for MozillaThunderbird
Description of the patch
This update to MozillaThunderbird 51.1.0 fixes security issues and bugs.
In general, these flaws cannot be exploited through email because
scripting is disabled when reading mail, but are potentially
risks in browser or browser-like contexts.
The following vulnerabilities were fixed:
boo#1035082, MFSA 2017-13, boo#1028391, MFSA 2017-09)
- CVE-2017-5443: Out-of-bounds write during BinHex decoding
- CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
- CVE-2017-5467: Memory corruption when drawing Skia content
- CVE-2017-5460: Use-after-free in frame selection
- CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
- CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- CVE-2017-5447: Out-of-bounds read during glyph processing
- CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- CVE-2017-5442: Use-after-free during style changes
- CVE-2017-5469: Potential Buffer overflow in flex-generated code
- CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- CVE-2017-5441: Use-after-free with selection during scroll events
- CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- CVE-2017-5437: Vulnerabilities in Libevent library
- CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- CVE-2017-5435: Use-after-free during transaction processing in the editor
- CVE-2017-5434: Use-after-free during focus handling
- CVE-2017-5433: Use-after-free in SMIL animation functions
- CVE-2017-5432: Use-after-free in text input selection
- CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
- CVE-2017-5459: Buffer overflow in WebGL
- CVE-2017-5454; Sandbox escape allowing file system read access through file picker
- CVE-2017-5451: Addressbar spoofing with onblur event
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5403: Use-after-free using addRange to add range to an incorrect root object
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5406: Segmentation fault in Skia with canvas operations
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5412: Buffer overflow read in SVG filters
- CVE-2017-5413: Segmentation fault during bidirectional operations
- CVE-2017-5414: File picker can choose incorrect default directory
- CVE-2017-5416: Null dereference crash in HttpChannel
- CVE-2017-5426: Gecko Media Plugin sandbox is not started if seccomp-bpf filter is running
- CVE-2017-5418: Out of bounds read when parsing HTTP digest authorization responses
- CVE-2017-5419: Repeated authentication prompts lead to DOS attack
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5421: Print preview spoofing
- CVE-2017-5422: DOS attack by using view-source: protocol repeatedly in one hyperlink
- CVE-2017-5399: Memory safety bugs fixed in Thunderbird 52
- CVE-2017-5398: Memory safety bugs fixed in Thunderbird 52 and Thunderbird 45.8
The following non-security changes are included:
- Background images not working and other issues related to embedded images when composing email have been fixed
- Google Oauth setup can sometimes not progress to the next step
- Clicking on a link in an email may not open this link in the external browser
- addon blocklist updates
- enable ALSA for systems without PulseAudio
- Optionally remove corresponding data files when removing an account
- Possibility to copy message filter
- Calendar: Event can now be created and edited in a tab
- Calendar: Processing of received invitation counter proposals
- Chat: Support Twitter Direct Messages
- Chat: Liking and favoriting in Twitter
- Chat: Removed Yahoo! Messenger support
Patchnames
openSUSE-2017-574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for MozillaThunderbird", "title": "Title of the patch" }, { "category": "description", "text": "This update to MozillaThunderbird 51.1.0 fixes security issues and bugs.\n\nIn general, these flaws cannot be exploited through email because\nscripting is disabled when reading mail, but are potentially\nrisks in browser or browser-like contexts.\n\nThe following vulnerabilities were fixed:\nboo#1035082, MFSA 2017-13, boo#1028391, MFSA 2017-09)\n\n- CVE-2017-5443: Out-of-bounds write during BinHex decoding\n- CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1\n- CVE-2017-5464: Memory corruption with accessibility and DOM manipulation\n- CVE-2017-5465: Out-of-bounds read in ConvolvePixel\n- CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL\n- CVE-2017-5467: Memory corruption when drawing Skia content\n- CVE-2017-5460: Use-after-free in frame selection\n- CVE-2017-5449: Crash during bidirectional unicode manipulation with animation\n- CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data\n- CVE-2017-5447: Out-of-bounds read during glyph processing\n- CVE-2017-5444: Buffer overflow while parsing application/http-index-format content\n- CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content\n- CVE-2017-5442: Use-after-free during style changes\n- CVE-2017-5469: Potential Buffer overflow in flex-generated code\n- CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing\n- CVE-2017-5441: Use-after-free with selection during scroll events\n- CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing\n- CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing\n- CVE-2017-5437: Vulnerabilities in Libevent library\n- CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2\n- CVE-2017-5435: Use-after-free during transaction processing in the editor\n- CVE-2017-5434: Use-after-free during focus handling\n- CVE-2017-5433: Use-after-free in SMIL animation functions\n- CVE-2017-5432: Use-after-free in text input selection\n- CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1\n- CVE-2017-5459: Buffer overflow in WebGL\n- CVE-2017-5454; Sandbox escape allowing file system read access through file picker\n- CVE-2017-5451: Addressbar spoofing with onblur event\n- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP\n- CVE-2017-5401: Memory Corruption when handling ErrorResult\n- CVE-2017-5402: Use-after-free working with events in FontFace objects\n- CVE-2017-5403: Use-after-free using addRange to add range to an incorrect root object\n- CVE-2017-5404: Use-after-free working with ranges in selections\n- CVE-2017-5406: Segmentation fault in Skia with canvas operations \n- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters\n- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping\n- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS\n- CVE-2017-5412: Buffer overflow read in SVG filters\n- CVE-2017-5413: Segmentation fault during bidirectional operations\n- CVE-2017-5414: File picker can choose incorrect default directory\n- CVE-2017-5416: Null dereference crash in HttpChannel\n- CVE-2017-5426: Gecko Media Plugin sandbox is not started if seccomp-bpf filter is running\n- CVE-2017-5418: Out of bounds read when parsing HTTP digest authorization responses\n- CVE-2017-5419: Repeated authentication prompts lead to DOS attack\n- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports\n- CVE-2017-5421: Print preview spoofing\n- CVE-2017-5422: DOS attack by using view-source: protocol repeatedly in one hyperlink\n- CVE-2017-5399: Memory safety bugs fixed in Thunderbird 52\n- CVE-2017-5398: Memory safety bugs fixed in Thunderbird 52 and Thunderbird 45.8\n\nThe following non-security changes are included:\n\n- Background images not working and other issues related to embedded images when composing email have been fixed\n- Google Oauth setup can sometimes not progress to the next step\n- Clicking on a link in an email may not open this link in the external browser\n- addon blocklist updates\n- enable ALSA for systems without PulseAudio\n- Optionally remove corresponding data files when removing an account\n- Possibility to copy message filter\n- Calendar: Event can now be created and edited in a tab\n- Calendar: Processing of received invitation counter proposals\n- Chat: Support Twitter Direct Messages\n- Chat: Liking and favoriting in Twitter\n- Chat: Removed Yahoo! Messenger support\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2017-574", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_1268-1.json" }, { "category": "self", "summary": "SUSE Bug 1028391", "url": "https://bugzilla.suse.com/1028391" }, { "category": "self", "summary": "SUSE Bug 1035082", "url": "https://bugzilla.suse.com/1035082" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5398 page", "url": "https://www.suse.com/security/cve/CVE-2017-5398/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5399 page", "url": "https://www.suse.com/security/cve/CVE-2017-5399/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5400 page", "url": "https://www.suse.com/security/cve/CVE-2017-5400/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5401 page", "url": "https://www.suse.com/security/cve/CVE-2017-5401/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5402 page", "url": "https://www.suse.com/security/cve/CVE-2017-5402/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5403 page", "url": "https://www.suse.com/security/cve/CVE-2017-5403/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5404 page", "url": "https://www.suse.com/security/cve/CVE-2017-5404/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5405 page", "url": "https://www.suse.com/security/cve/CVE-2017-5405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5406 page", "url": "https://www.suse.com/security/cve/CVE-2017-5406/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5407 page", "url": "https://www.suse.com/security/cve/CVE-2017-5407/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5408 page", "url": "https://www.suse.com/security/cve/CVE-2017-5408/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5410 page", "url": "https://www.suse.com/security/cve/CVE-2017-5410/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5412 page", "url": "https://www.suse.com/security/cve/CVE-2017-5412/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5413 page", "url": "https://www.suse.com/security/cve/CVE-2017-5413/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5414 page", "url": "https://www.suse.com/security/cve/CVE-2017-5414/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5416 page", "url": "https://www.suse.com/security/cve/CVE-2017-5416/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5418 page", "url": "https://www.suse.com/security/cve/CVE-2017-5418/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5419 page", "url": "https://www.suse.com/security/cve/CVE-2017-5419/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5421 page", "url": "https://www.suse.com/security/cve/CVE-2017-5421/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5422 page", "url": "https://www.suse.com/security/cve/CVE-2017-5422/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5426 page", "url": "https://www.suse.com/security/cve/CVE-2017-5426/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5429 page", "url": "https://www.suse.com/security/cve/CVE-2017-5429/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5430 page", "url": "https://www.suse.com/security/cve/CVE-2017-5430/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5432 page", "url": "https://www.suse.com/security/cve/CVE-2017-5432/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5433 page", "url": "https://www.suse.com/security/cve/CVE-2017-5433/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5434 page", "url": "https://www.suse.com/security/cve/CVE-2017-5434/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5435 page", "url": "https://www.suse.com/security/cve/CVE-2017-5435/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5436 page", "url": "https://www.suse.com/security/cve/CVE-2017-5436/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5437 page", "url": "https://www.suse.com/security/cve/CVE-2017-5437/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5438 page", "url": "https://www.suse.com/security/cve/CVE-2017-5438/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5439 page", "url": "https://www.suse.com/security/cve/CVE-2017-5439/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5440 page", "url": "https://www.suse.com/security/cve/CVE-2017-5440/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5441 page", "url": "https://www.suse.com/security/cve/CVE-2017-5441/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5442 page", "url": "https://www.suse.com/security/cve/CVE-2017-5442/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5443 page", "url": "https://www.suse.com/security/cve/CVE-2017-5443/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5444 page", "url": "https://www.suse.com/security/cve/CVE-2017-5444/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5445 page", "url": "https://www.suse.com/security/cve/CVE-2017-5445/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5446 page", "url": "https://www.suse.com/security/cve/CVE-2017-5446/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5447 page", "url": "https://www.suse.com/security/cve/CVE-2017-5447/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5449 page", "url": "https://www.suse.com/security/cve/CVE-2017-5449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5451 page", "url": "https://www.suse.com/security/cve/CVE-2017-5451/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5454 page", "url": "https://www.suse.com/security/cve/CVE-2017-5454/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5459 page", "url": "https://www.suse.com/security/cve/CVE-2017-5459/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5460 page", "url": "https://www.suse.com/security/cve/CVE-2017-5460/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5461 page", "url": "https://www.suse.com/security/cve/CVE-2017-5461/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5462 page", "url": "https://www.suse.com/security/cve/CVE-2017-5462/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5464 page", "url": "https://www.suse.com/security/cve/CVE-2017-5464/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5465 page", "url": "https://www.suse.com/security/cve/CVE-2017-5465/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5466 page", "url": "https://www.suse.com/security/cve/CVE-2017-5466/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5467 page", "url": "https://www.suse.com/security/cve/CVE-2017-5467/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5469 page", "url": "https://www.suse.com/security/cve/CVE-2017-5469/" } ], "title": "Security update for MozillaThunderbird", "tracking": { "current_release_date": "2017-05-15T11:20:05Z", "generator": { "date": "2017-05-15T11:20:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2017:1268-1", "initial_release_date": "2017-05-15T11:20:05Z", "revision_history": [ { "date": "2017-05-15T11:20:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "MozillaThunderbird-52.1.0-30.1.x86_64", "product": { "name": "MozillaThunderbird-52.1.0-30.1.x86_64", "product_id": "MozillaThunderbird-52.1.0-30.1.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "product": { "name": "MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "product_id": "MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-devel-52.1.0-30.1.x86_64", "product": { "name": "MozillaThunderbird-devel-52.1.0-30.1.x86_64", "product_id": "MozillaThunderbird-devel-52.1.0-30.1.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "product": { "name": "MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "product_id": "MozillaThunderbird-translations-common-52.1.0-30.1.x86_64" } }, { "category": "product_version", "name": "MozillaThunderbird-translations-other-52.1.0-30.1.x86_64", "product": { "name": "MozillaThunderbird-translations-other-52.1.0-30.1.x86_64", "product_id": "MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-52.1.0-30.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64" }, "product_reference": "MozillaThunderbird-52.1.0-30.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64" }, "product_reference": "MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-devel-52.1.0-30.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64" }, "product_reference": "MozillaThunderbird-devel-52.1.0-30.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-translations-common-52.1.0-30.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64" }, "product_reference": "MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaThunderbird-translations-other-52.1.0-30.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" }, "product_reference": "MozillaThunderbird-translations-other-52.1.0-30.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5398", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5398" } ], "notes": [ { "category": "general", "text": "Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5398", "url": "https://www.suse.com/security/cve/CVE-2017-5398" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5398", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5398", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5398" }, { "cve": "CVE-2017-5399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5399" } ], "notes": [ { "category": "general", "text": "Memory safety bugs were reported in Firefox 51. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5399", "url": "https://www.suse.com/security/cve/CVE-2017-5399" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5399", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5399", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5399" }, { "cve": "CVE-2017-5400", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5400" } ], "notes": [ { "category": "general", "text": "JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5400", "url": "https://www.suse.com/security/cve/CVE-2017-5400" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5400", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5400", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5400" }, { "cve": "CVE-2017-5401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5401" } ], "notes": [ { "category": "general", "text": "A crash triggerable by web content in which an \"ErrorResult\" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5401", "url": "https://www.suse.com/security/cve/CVE-2017-5401" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5401", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5401", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5401" }, { "cve": "CVE-2017-5402", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5402" } ], "notes": [ { "category": "general", "text": "A use-after-free can occur when events are fired for a \"FontFace\" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5402", "url": "https://www.suse.com/security/cve/CVE-2017-5402" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5402", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5402", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5402" }, { "cve": "CVE-2017-5403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5403" } ], "notes": [ { "category": "general", "text": "When adding a range to an object in the DOM, it is possible to use \"addRange\" to add the range to an incorrect root object. This triggers a use-after-free, resulting in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5403", "url": "https://www.suse.com/security/cve/CVE-2017-5403" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5403", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5403", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5403" }, { "cve": "CVE-2017-5404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5404" } ], "notes": [ { "category": "general", "text": "A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5404", "url": "https://www.suse.com/security/cve/CVE-2017-5404" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5404", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5404", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5404" }, { "cve": "CVE-2017-5405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5405" } ], "notes": [ { "category": "general", "text": "Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5405", "url": "https://www.suse.com/security/cve/CVE-2017-5405" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5405", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5405", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5405" }, { "cve": "CVE-2017-5406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5406" } ], "notes": [ { "category": "general", "text": "A segmentation fault can occur in the Skia graphics library during some canvas operations due to issues with mask/clip intersection and empty masks. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5406", "url": "https://www.suse.com/security/cve/CVE-2017-5406" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5406", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5406", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5406" }, { "cve": "CVE-2017-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5407" } ], "notes": [ { "category": "general", "text": "Using SVG filters that don\u0027t use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5407", "url": "https://www.suse.com/security/cve/CVE-2017-5407" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5407", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5407", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5407" }, { "cve": "CVE-2017-5408", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5408" } ], "notes": [ { "category": "general", "text": "Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5408", "url": "https://www.suse.com/security/cve/CVE-2017-5408" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5408", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5408", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5408" }, { "cve": "CVE-2017-5410", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5410" } ], "notes": [ { "category": "general", "text": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5410", "url": "https://www.suse.com/security/cve/CVE-2017-5410" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5410", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5410", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5410" }, { "cve": "CVE-2017-5412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5412" } ], "notes": [ { "category": "general", "text": "A buffer overflow read during SVG filter color value operations, resulting in data exposure. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5412", "url": "https://www.suse.com/security/cve/CVE-2017-5412" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5412", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5412", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5412" }, { "cve": "CVE-2017-5413", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5413" } ], "notes": [ { "category": "general", "text": "A segmentation fault can occur during some bidirectional layout operations. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5413", "url": "https://www.suse.com/security/cve/CVE-2017-5413" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5413", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5413", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5413" }, { "cve": "CVE-2017-5414", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5414" } ], "notes": [ { "category": "general", "text": "The file picker dialog can choose and display the wrong local default directory when instantiated. On some operating systems, this can lead to information disclosure, such as the operating system or the local account name. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5414", "url": "https://www.suse.com/security/cve/CVE-2017-5414" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5414", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5414", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5414" }, { "cve": "CVE-2017-5416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5416" } ], "notes": [ { "category": "general", "text": "In certain circumstances a networking event listener can be prematurely released. This appears to result in a null dereference in practice. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5416", "url": "https://www.suse.com/security/cve/CVE-2017-5416" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5416", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5416", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5416" }, { "cve": "CVE-2017-5418", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5418" } ], "notes": [ { "category": "general", "text": "An out of bounds read error occurs when parsing some HTTP digest authorization responses, resulting in information leakage through the reading of random memory containing matches to specifically set patterns. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5418", "url": "https://www.suse.com/security/cve/CVE-2017-5418" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5418", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5418", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5418" }, { "cve": "CVE-2017-5419", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5419" } ], "notes": [ { "category": "general", "text": "If a malicious site repeatedly triggers a modal authentication prompt, eventually the browser UI will become non-responsive, requiring shutdown through the operating system. This is a denial of service (DOS) attack. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5419", "url": "https://www.suse.com/security/cve/CVE-2017-5419" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5419", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5419", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5419" }, { "cve": "CVE-2017-5421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5421" } ], "notes": [ { "category": "general", "text": "A malicious site could spoof the contents of the print preview window if popup windows are enabled, resulting in user confusion of what site is currently loaded. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5421", "url": "https://www.suse.com/security/cve/CVE-2017-5421" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5421", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5421", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5421" }, { "cve": "CVE-2017-5422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5422" } ], "notes": [ { "category": "general", "text": "If a malicious site uses the \"view-source:\" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hyperlink is selected. This was fixed by no longer making \"view-source:\" linkable. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5422", "url": "https://www.suse.com/security/cve/CVE-2017-5422" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5422", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5422", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5422" }, { "cve": "CVE-2017-5426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5426" } ], "notes": [ { "category": "general", "text": "On Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which is typically weak compared to the sandbox. Note: this issue only affects Linux. Other operating systems are not affected. This vulnerability affects Firefox \u003c 52 and Thunderbird \u003c 52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5426", "url": "https://www.suse.com/security/cve/CVE-2017-5426" }, { "category": "external", "summary": "SUSE Bug 1028391 for CVE-2017-5426", "url": "https://bugzilla.suse.com/1028391" }, { "category": "external", "summary": "SUSE Bug 1028393 for CVE-2017-5426", "url": "https://bugzilla.suse.com/1028393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5426" }, { "cve": "CVE-2017-5429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5429" } ], "notes": [ { "category": "general", "text": "Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5429", "url": "https://www.suse.com/security/cve/CVE-2017-5429" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5429", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5429", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5429" }, { "cve": "CVE-2017-5430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5430" } ], "notes": [ { "category": "general", "text": "Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5430", "url": "https://www.suse.com/security/cve/CVE-2017-5430" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5430", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5430", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5430" }, { "cve": "CVE-2017-5432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5432" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5432", "url": "https://www.suse.com/security/cve/CVE-2017-5432" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5432", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5432", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5432" }, { "cve": "CVE-2017-5433", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5433" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5433", "url": "https://www.suse.com/security/cve/CVE-2017-5433" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5433", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5433", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5433" }, { "cve": "CVE-2017-5434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5434" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5434", "url": "https://www.suse.com/security/cve/CVE-2017-5434" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5434", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5434", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5434" }, { "cve": "CVE-2017-5435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5435" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5435", "url": "https://www.suse.com/security/cve/CVE-2017-5435" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5435", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5435", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5435" }, { "cve": "CVE-2017-5436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5436" } ], "notes": [ { "category": "general", "text": "An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5436", "url": "https://www.suse.com/security/cve/CVE-2017-5436" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5436", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035204 for CVE-2017-5436", "url": "https://bugzilla.suse.com/1035204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5436" }, { "cve": "CVE-2017-5437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5437" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197. Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197. Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5437", "url": "https://www.suse.com/security/cve/CVE-2017-5437" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5437", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5437", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "important" } ], "title": "CVE-2017-5437" }, { "cve": "CVE-2017-5438", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5438" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5438", "url": "https://www.suse.com/security/cve/CVE-2017-5438" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5438", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5438", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5438" }, { "cve": "CVE-2017-5439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5439" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5439", "url": "https://www.suse.com/security/cve/CVE-2017-5439" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5439", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5439", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5439" }, { "cve": "CVE-2017-5440", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5440" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5440", "url": "https://www.suse.com/security/cve/CVE-2017-5440" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5440", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5440", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5440" }, { "cve": "CVE-2017-5441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5441" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5441", "url": "https://www.suse.com/security/cve/CVE-2017-5441" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5441", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5441", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5441" }, { "cve": "CVE-2017-5442", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5442" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5442", "url": "https://www.suse.com/security/cve/CVE-2017-5442" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5442", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5442", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5442" }, { "cve": "CVE-2017-5443", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5443" } ], "notes": [ { "category": "general", "text": "An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5443", "url": "https://www.suse.com/security/cve/CVE-2017-5443" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5443", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5443", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5443" }, { "cve": "CVE-2017-5444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5444" } ], "notes": [ { "category": "general", "text": "A buffer overflow vulnerability while parsing \"application/http-index-format\" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5444", "url": "https://www.suse.com/security/cve/CVE-2017-5444" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5444", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5444", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5444" }, { "cve": "CVE-2017-5445", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5445" } ], "notes": [ { "category": "general", "text": "A vulnerability while parsing \"application/http-index-format\" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5445", "url": "https://www.suse.com/security/cve/CVE-2017-5445" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5445", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5445", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5445" }, { "cve": "CVE-2017-5446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5446" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read when an HTTP/2 connection to a servers sends \"DATA\" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5446", "url": "https://www.suse.com/security/cve/CVE-2017-5446" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5446", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5446", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5446" }, { "cve": "CVE-2017-5447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5447" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5447", "url": "https://www.suse.com/security/cve/CVE-2017-5447" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5447", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5447", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5447" }, { "cve": "CVE-2017-5449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5449" } ], "notes": [ { "category": "general", "text": "A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5449", "url": "https://www.suse.com/security/cve/CVE-2017-5449" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5449", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5449", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5449" }, { "cve": "CVE-2017-5451", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5451" } ], "notes": [ { "category": "general", "text": "A mechanism to spoof the addressbar through the user interaction on the addressbar and the \"onblur\" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5451", "url": "https://www.suse.com/security/cve/CVE-2017-5451" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5451", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5451", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5451" }, { "cve": "CVE-2017-5454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5454" } ], "notes": [ { "category": "general", "text": "A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5454", "url": "https://www.suse.com/security/cve/CVE-2017-5454" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5454", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5454", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "low" } ], "title": "CVE-2017-5454" }, { "cve": "CVE-2017-5459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5459" } ], "notes": [ { "category": "general", "text": "A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5459", "url": "https://www.suse.com/security/cve/CVE-2017-5459" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5459", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5459", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5459" }, { "cve": "CVE-2017-5460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5460" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5460", "url": "https://www.suse.com/security/cve/CVE-2017-5460" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5460", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5460", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5460" }, { "cve": "CVE-2017-5461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5461" } ], "notes": [ { "category": "general", "text": "Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5461", "url": "https://www.suse.com/security/cve/CVE-2017-5461" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5461", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5461", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "important" } ], "title": "CVE-2017-5461" }, { "cve": "CVE-2017-5462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5462" } ], "notes": [ { "category": "general", "text": "A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5462", "url": "https://www.suse.com/security/cve/CVE-2017-5462" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5462", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5462", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5462" }, { "cve": "CVE-2017-5464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5464" } ], "notes": [ { "category": "general", "text": "During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5464", "url": "https://www.suse.com/security/cve/CVE-2017-5464" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5464", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5464", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5464" }, { "cve": "CVE-2017-5465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5465" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read while processing SVG content in \"ConvolvePixel\". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5465", "url": "https://www.suse.com/security/cve/CVE-2017-5465" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5465", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5465", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5465" }, { "cve": "CVE-2017-5466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5466" } ], "notes": [ { "category": "general", "text": "If a page is loaded from an original site through a hyperlink and contains a redirect to a \"data:text/html\" URL, triggering a reload will run the reloaded \"data:text/html\" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5466", "url": "https://www.suse.com/security/cve/CVE-2017-5466" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5466", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5466", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5466" }, { "cve": "CVE-2017-5467", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5467" } ], "notes": [ { "category": "general", "text": "A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5467", "url": "https://www.suse.com/security/cve/CVE-2017-5467" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5467", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5467", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5467" }, { "cve": "CVE-2017-5469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5469" } ], "notes": [ { "category": "general", "text": "Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5469", "url": "https://www.suse.com/security/cve/CVE-2017-5469" }, { "category": "external", "summary": "SUSE Bug 1035082 for CVE-2017-5469", "url": "https://bugzilla.suse.com/1035082" }, { "category": "external", "summary": "SUSE Bug 1035209 for CVE-2017-5469", "url": "https://bugzilla.suse.com/1035209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:MozillaThunderbird-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-devel-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-common-52.1.0-30.1.x86_64", "SUSE Package Hub 12:MozillaThunderbird-translations-other-52.1.0-30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-15T11:20:05Z", "details": "moderate" } ], "title": "CVE-2017-5469" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…