SUSE-SU-2018:3247-1: important: Security update for MozillaThunderbird

sle-security-updates at sle-security-updates at
Fri Oct 19 10:24:29 MDT 2018

   SUSE Security Update: Security update for MozillaThunderbird

Announcement ID:    SUSE-SU-2018:3247-1
Rating:             important
References:         #1066489 #1084603 #1098998 #1107343 #1107772 
                    #1109363 #1109379 
Cross-References:   CVE-2017-16541 CVE-2018-12359 CVE-2018-12360
                    CVE-2018-12361 CVE-2018-12362 CVE-2018-12363
                    CVE-2018-12364 CVE-2018-12365 CVE-2018-12366
                    CVE-2018-12367 CVE-2018-12371 CVE-2018-12376
                    CVE-2018-12377 CVE-2018-12378 CVE-2018-12383
                    CVE-2018-12385 CVE-2018-5156 CVE-2018-5187
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 15

   An update that fixes 19 vulnerabilities is now available.


   This update for MozillaThunderbird to version 60.2.1 fixes the following

   Update to Thunderbird 60.2.1:

   * Calendar: Default values for the first day of the week and working days
     are now derived from the selected datetime formatting locale
   * Calendar: Switch to a Photon-style icon set for all platforms
   * Fix multiple requests for master password when Google Mail or Calendar
     OAuth2 is enabled
   * Fix scrollbar of the address entry auto-complete popup
   * Fix security info dialog in compose window not showing certificate status
   * Fix links in the Add-on Manager's search results and theme browsing tabs
     that opened in external browser
   * Fix localization not showing the localized name for the "Drafts" and
     "Sent" folders for certain IMAP providers
   * Fix replying to a message with an empty subject which inserted Re: twice
   * Fix spellcheck marks disappeaing erroneously for words with an apostrophe
   * Calendar: First day of the week can now be set
   * Calendar: Several fixes related to cutting/deleting of events and email

   These security issues were fixed:

   - CVE-2018-12359: Prevent buffer overflow using computed size of canvas
     element (bsc#1098998).
   - CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998).
   - CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998).
   - CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998).
   - CVE-2018-5156: Prevent media recorder segmentation fault when track type
     is changed during capture (bsc#1098998).
   - CVE-2018-12363: Prevent use-after-free when appending DOM nodes
   - CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI
     plugins (bsc#1098998).
   - CVE-2018-12365: Prevent compromised IPC child process listing local
     filenames (bsc#1098998).
   - CVE-2018-12371: Prevent integer overflow in Skia library during edge
     builder allocation (bsc#1098998).
   - CVE-2018-12366: Prevent invalid data handling during QCMS
     transformations (bsc#1098998).
   - CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming
   - CVE-2018-5187: Various memory safety bugs (bsc#1098998).
   - CVE-2018-5188: Various memory safety bugs (bsc#1098998).
   - CVE-2018-12377: Prevent use-after-free in refresh driver timers
   - CVE-2018-12378: Prevent use-after-free in IndexedDB (bsc#1107343)
   - CVE-2017-16541: Prevent proxy bypass using automount and autofs
   - CVE-2018-12376: Fixed various memory safety bugs (bsc#1107343)
   - CVE-2018-12385: Fixed crash in TransportSecurityInfo due to cached data
   - CVE-2018-12383: Fixed that setting a master password did not delete
     unencrypted previously stored passwords (bsc#1107343)

   These can not, in general, be exploited through email, but are potential
   risks in browser or browser-like contexts.

   These non-security issues were fixed:

   - Storing of remote content settings fixed (bsc#1084603)
   - Improved message handling and composing
   - Improved handling of message templates
   - Support for OAuth2 and FIDO U2F
   - Various Calendar improvements
   - Various fixes and changes to e-mail workflow
   - Various IMAP fixes
   - Native desktop notifications
   - Fix date display issues (bsc#1109379)
   - Fix start-up crash due to folder name with special characters

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 15:

      zypper in -t patch SUSE-SLE-Product-WE-15-2018-2333=1

Package List:

   - SUSE Linux Enterprise Workstation Extension 15 (x86_64):



More information about the sle-security-updates mailing list