thunderbird (SL5, SL6, SL7)

Synopsis: Important: thunderbird security update
Advisory ID: SLSA-2015:2519-1
Issue Date: 2015-11-26
CVE Numbers: CVE-2015-4513
CVE-2015-7189
CVE-2015-7193
CVE-2015-7198
CVE-2015-7197
CVE-2015-7199
CVE-2015-7200

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197,
CVE-2015-7198, CVE-2015-7199, CVE-2015-7200)

A same-origin policy bypass flaw was found in the way Thunderbird handled
certain cross-origin resource sharing (CORS) requests. A web page
containing malicious content could cause Thunderbird to disclose sensitive
information. (CVE-2015-7193)

Note: All of the above issues cannot be exploited by a specially crafted
HTML mail message because JavaScript is disabled by default for mail
messages. However, they could be exploited in other ways in Thunderbird
(for example, by viewing the full remote content of an RSS feed).

After installing the update, Thunderbird must be restarted for the changes
to take effect.

SL5
x86_64
thunderbird-38.4.0-1.el5_11.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el5_11.x86_64.rpm
i386
thunderbird-38.4.0-1.el5_11.i386.rpm
thunderbird-debuginfo-38.4.0-1.el5_11.i386.rpm
SL6
x86_64
thunderbird-38.4.0-1.el6_7.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.x86_64.rpm
i386
thunderbird-38.4.0-1.el6_7.i686.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.i686.rpm
SL7
x86_64
thunderbird-38.4.0-1.el7_2.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el7_2.x86_64.rpm

– Scientific Linux Development Team