SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3247-1
Rating:             important
References:         #1066489 #1084603 #1098998 #1107343 #1107772 
                    #1109363 #1109379 
Cross-References:   CVE-2017-16541 CVE-2018-12359 CVE-2018-12360
                    CVE-2018-12361 CVE-2018-12362 CVE-2018-12363
                    CVE-2018-12364 CVE-2018-12365 CVE-2018-12366
                    CVE-2018-12367 CVE-2018-12371 CVE-2018-12376
                    CVE-2018-12377 CVE-2018-12378 CVE-2018-12383
                    CVE-2018-12385 CVE-2018-5156 CVE-2018-5187
                    CVE-2018-5188
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 15
______________________________________________________________________________

   An update that fixes 19 vulnerabilities is now available.

Description:

   This update for MozillaThunderbird to version 60.2.1 fixes the following
   issues:

   Update to Thunderbird 60.2.1:

   * Calendar: Default values for the first day of the week and working days
     are now derived from the selected datetime formatting locale
   * Calendar: Switch to a Photon-style icon set for all platforms
   * Fix multiple requests for master password when Google Mail or Calendar
     OAuth2 is enabled
   * Fix scrollbar of the address entry auto-complete popup
   * Fix security info dialog in compose window not showing certificate status
   * Fix links in the Add-on Manager's search results and theme browsing tabs
     that opened in external browser
   * Fix localization not showing the localized name for the "Drafts" and
     "Sent" folders for certain IMAP providers   * Fix replying to a message with an empty subject which inserted Re: twice
   * Fix spellcheck marks disappeaing erroneously for words with an apostrophe
   * Calendar: First day of the week can now be set
   * Calendar: Several fixes related to cutting/deleting of events and email
     schedulin

   These security issues were fixed:

   - CVE-2018-12359: Prevent buffer overflow using computed size of canvas
     element (bsc#1098998).
   - CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998).
   - CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998).
   - CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998).
   - CVE-2018-5156: Prevent media recorder segmentation fault when track type
     is changed during capture (bsc#1098998).
   - CVE-2018-12363: Prevent use-after-free when appending DOM nodes
     (bsc#1098998).
   - CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI
     plugins (bsc#1098998).
   - CVE-2018-12365: Prevent compromised IPC child process listing local
     filenames (bsc#1098998).
   - CVE-2018-12371: Prevent integer overflow in Skia library during edge
     builder allocation (bsc#1098998).
   - CVE-2018-12366: Prevent invalid data handling during QCMS
     transformations (bsc#1098998).
   - CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming
     (bsc#1098998).
   - CVE-2018-5187: Various memory safety bugs (bsc#1098998).
   - CVE-2018-5188: Various memory safety bugs (bsc#1098998).
   - CVE-2018-12377: Prevent use-after-free in refresh driver timers     (bsc#1107343)
   - CVE-2018-12378: Prevent use-after-free in IndexedDB (bsc#1107343)
   - CVE-2017-16541: Prevent proxy bypass using automount and autofs
     (bsc#1066489)
   - CVE-2018-12376: Fixed various memory safety bugs (bsc#1107343)
   - CVE-2018-12385: Fixed crash in TransportSecurityInfo due to cached data
     (bsc#1109363)
   - CVE-2018-12383: Fixed that setting a master password did not delete
     unencrypted previously stored passwords (bsc#1107343)

   These can not, in general, be exploited through email, but are potential
   risks in browser or browser-like contexts.

   These non-security issues were fixed:

   - Storing of remote content settings fixed (bsc#1084603)
   - Improved message handling and composing
   - Improved handling of message templates
   - Support for OAuth2 and FIDO U2F
   - Various Calendar improvements
   - Various fixes and changes to e-mail workflow
   - Various IMAP fixes
   - Native desktop notifications
   - Fix date display issues (bsc#1109379)
   - Fix start-up crash due to folder name with special characters     (bsc#1107772)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 15:

      zypper in -t patch SUSE-SLE-Product-WE-15-2018-2333=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 15 (x86_64):

      MozillaThunderbird-60.2.1-3.13.1
      MozillaThunderbird-debuginfo-60.2.1-3.13.1
      MozillaThunderbird-debugsource-60.2.1-3.13.1
      MozillaThunderbird-translations-common-60.2.1-3.13.1
      MozillaThunderbird-translations-other-60.2.1-3.13.1


References:

   https://www.suse.com/security/cve/CVE-2017-16541.html
   https://www.suse.com/security/cve/CVE-2018-12359.html
   https://www.suse.com/security/cve/CVE-2018-12360.html
   https://www.suse.com/security/cve/CVE-2018-12361.html
   https://www.suse.com/security/cve/CVE-2018-12362.html
   https://www.suse.com/security/cve/CVE-2018-12363.html
   https://www.suse.com/security/cve/CVE-2018-12364.html
   https://www.suse.com/security/cve/CVE-2018-12365.html
   https://www.suse.com/security/cve/CVE-2018-12366.html
   https://www.suse.com/security/cve/CVE-2018-12367.html
   https://www.suse.com/security/cve/CVE-2018-12371.html
   https://www.suse.com/security/cve/CVE-2018-12376.html
   https://www.suse.com/security/cve/CVE-2018-12377.html
   https://www.suse.com/security/cve/CVE-2018-12378.html
   https://www.suse.com/security/cve/CVE-2018-12383.html
   https://www.suse.com/security/cve/CVE-2018-12385.html
   https://www.suse.com/security/cve/CVE-2018-5156.html
   https://www.suse.com/security/cve/CVE-2018-5187.html
   https://www.suse.com/security/cve/CVE-2018-5188.html
   https://bugzilla.suse.com/1066489
   https://bugzilla.suse.com/1084603
   https://bugzilla.suse.com/1098998
   https://bugzilla.suse.com/1107343
   https://bugzilla.suse.com/1107772
   https://bugzilla.suse.com/1109363
   https://bugzilla.suse.com/1109379

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:3247-1 important: MozillaThunderbird

October 19, 2018
An update that fixes 19 vulnerabilities is now available

Summary

This update for MozillaThunderbird to version 60.2.1 fixes the following issues: Update to Thunderbird 60.2.1: * Calendar: Default values for the first day of the week and working days are now derived from the selected datetime formatting locale * Calendar: Switch to a Photon-style icon set for all platforms * Fix multiple requests for master password when Google Mail or Calendar OAuth2 is enabled * Fix scrollbar of the address entry auto-complete popup * Fix security info dialog in compose window not showing certificate status * Fix links in the Add-on Manager's search results and theme browsing tabs that opened in external browser * Fix localization not showing the localized name for the "Drafts" and "Sent" folders for certain IMAP providers * Fix replying to a message with an empty subject which inserted Re: twice * Fix spellcheck marks disappeaing erroneously for words with an apostrophe * Calendar: First day of the week can now be set * Calendar: Several fixes related to cutting/deleting of events and email schedulin These security issues were fixed: - CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998). - CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998). - CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998). - CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998). - CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998). - CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998). - CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998). - CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998). - CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998). - CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998). - CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998). - CVE-2018-5187: Various memory safety bugs (bsc#1098998). - CVE-2018-5188: Various memory safety bugs (bsc#1098998). - CVE-2018-12377: Prevent use-after-free in refresh driver timers (bsc#1107343) - CVE-2018-12378: Prevent use-after-free in IndexedDB (bsc#1107343) - CVE-2017-16541: Prevent proxy bypass using automount and autofs (bsc#1066489) - CVE-2018-12376: Fixed various memory safety bugs (bsc#1107343) - CVE-2018-12385: Fixed crash in TransportSecurityInfo due to cached data (bsc#1109363) - CVE-2018-12383: Fixed that setting a master password did not delete unencrypted previously stored passwords (bsc#1107343) These can not, in general, be exploited through email, but are potential risks in browser or browser-like contexts. These non-security issues were fixed: - Storing of remote content settings fixed (bsc#1084603) - Improved message handling and composing - Improved handling of message templates - Support for OAuth2 and FIDO U2F - Various Calendar improvements - Various fixes and changes to e-mail workflow - Various IMAP fixes - Native desktop notifications - Fix date display issues (bsc#1109379) - Fix start-up crash due to folder name with special characters (bsc#1107772) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15: zypper in -t patch SUSE-SLE-Product-WE-15-2018-2333=1 Package List: - SUSE Linux Enterprise Workstation Extension 15 (x86_64): MozillaThunderbird-60.2.1-3.13.1 MozillaThunderbird-debuginfo-60.2.1-3.13.1 MozillaThunderbird-debugsource-60.2.1-3.13.1 MozillaThunderbird-translations-common-60.2.1-3.13.1 MozillaThunderbird-translations-other-60.2.1-3.13.1

References

#1066489 #1084603 #1098998 #1107343 #1107772

#1109363 #1109379

Cross- CVE-2017-16541 CVE-2018-12359 CVE-2018-12360

CVE-2018-12361 CVE-2018-12362 CVE-2018-12363

CVE-2018-12364 CVE-2018-12365 CVE-2018-12366

CVE-2018-12367 CVE-2018-12371 CVE-2018-12376

CVE-2018-12377 CVE-2018-12378 CVE-2018-12383

CVE-2018-12385 CVE-2018-5156 CVE-2018-5187

CVE-2018-5188

Affected Products:

SUSE Linux Enterprise Workstation Extension 15

https://www.suse.com/security/cve/CVE-2017-16541.html

https://www.suse.com/security/cve/CVE-2018-12359.html

https://www.suse.com/security/cve/CVE-2018-12360.html

https://www.suse.com/security/cve/CVE-2018-12361.html

https://www.suse.com/security/cve/CVE-2018-12362.html

https://www.suse.com/security/cve/CVE-2018-12363.html

https://www.suse.com/security/cve/CVE-2018-12364.html

https://www.suse.com/security/cve/CVE-2018-12365.html

https://www.suse.com/security/cve/CVE-2018-12366.html

https://www.suse.com/security/cve/CVE-2018-12367.html

https://www.suse.com/security/cve/CVE-2018-12371.html

https://www.suse.com/security/cve/CVE-2018-12376.html

https://www.suse.com/security/cve/CVE-2018-12377.html

https://www.suse.com/security/cve/CVE-2018-12378.html

https://www.suse.com/security/cve/CVE-2018-12383.html

https://www.suse.com/security/cve/CVE-2018-12385.html

https://www.suse.com/security/cve/CVE-2018-5156.html

https://www.suse.com/security/cve/CVE-2018-5187.html

https://www.suse.com/security/cve/CVE-2018-5188.html

https://bugzilla.suse.com/1066489

https://bugzilla.suse.com/1084603

https://bugzilla.suse.com/1098998

https://bugzilla.suse.com/1107343

https://bugzilla.suse.com/1107772

https://bugzilla.suse.com/1109363

https://bugzilla.suse.com/1109379

Severity
Announcement ID: SUSE-SU-2018:3247-1
Rating: important