Print

Print


Synopsis:          Important: thunderbird security update
Advisory ID:       SLSA-2015:2519-1
Issue Date:        2015-11-26
CVE Numbers:       CVE-2015-4513
                   CVE-2015-7189
                   CVE-2015-7193
                   CVE-2015-7198
                   CVE-2015-7197
                   CVE-2015-7199
                   CVE-2015-7200
--

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197,
CVE-2015-7198, CVE-2015-7199, CVE-2015-7200)

A same-origin policy bypass flaw was found in the way Thunderbird handled
certain cross-origin resource sharing (CORS) requests. A web page
containing malicious content could cause Thunderbird to disclose sensitive
information. (CVE-2015-7193)

Note: All of the above issues cannot be exploited by a specially crafted
HTML mail message because JavaScript is disabled by default for mail
messages. However, they could be exploited in other ways in Thunderbird
(for example, by viewing the full remote content of an RSS feed).

After installing the update, Thunderbird must be restarted for the changes
to take effect.
--

SL5
  x86_64
    thunderbird-38.4.0-1.el5_11.x86_64.rpm
    thunderbird-debuginfo-38.4.0-1.el5_11.x86_64.rpm
  i386
    thunderbird-38.4.0-1.el5_11.i386.rpm
    thunderbird-debuginfo-38.4.0-1.el5_11.i386.rpm
SL6
  x86_64
    thunderbird-38.4.0-1.el6_7.x86_64.rpm
    thunderbird-debuginfo-38.4.0-1.el6_7.x86_64.rpm
  i386
    thunderbird-38.4.0-1.el6_7.i686.rpm
    thunderbird-debuginfo-38.4.0-1.el6_7.i686.rpm
SL7
  x86_64
    thunderbird-38.4.0-1.el7_2.x86_64.rpm
    thunderbird-debuginfo-38.4.0-1.el7_2.x86_64.rpm

- Scientific Linux Development Team