File _patchinfo of Package patchinfo.11621
<patchinfo incident="11621">
<issue tracker="bnc" id="1137595">VUL-0: CVE-2019-11703,CVE-2019-11704,CVE-2019-11705,CVE-2019-11706: MozillaThunderbird: multiple vulnerabilities</issue>
<issue tracker="bnc" id="1138872">EMU: VUL-0: CVE-2019-11708: MozillaFirefox,MozillaThunderbird: sandbox escape using Prompt:Open fixed in 67.0.4, 60.7.2 ESR (MFSA 2019-19 and MFSA 2019-20)</issue>
<issue tracker="cve" id="2019-11704"/>
<issue tracker="cve" id="2019-11705"/>
<issue tracker="cve" id="2019-11706"/>
<issue tracker="cve" id="2019-11703"/>
<issue tracker="cve" id="2019-11707"/>
<issue tracker="cve" id="2019-11708"/>
<category>security</category>
<rating>important</rating>
<packager>MSirringhaus</packager>
<description>This update for MozillaThunderbird fixes the following issues:
Security issues fixed:
- CVE-2019-11703: Fixed a heap-based buffer overflow in icalmemorystrdupanddequote() (bsc#1137595).
- CVE-2019-11704: Fixed a heap-based buffer overflow in parser_get_next_char() (bsc#1137595).
- CVE-2019-11705: Fixed a stack-based buffer overflow in icalrecur_add_bydayrules() (bsc#1137595).
- CVE-2019-11706: Fixed a type confusion in icaltimezone_get_vtimezone_properties() (bsc#1137595).
- CVE-2019-11707: Fixed a type confusion in Array.pop (bsc#1138872).
- CVE-2019-11708: Fixed a sandbox escape using Prompt:Open (bsc#1138872).
</description>
<summary>Security update for MozillaThunderbird</summary>
</patchinfo>