Security update for MozillaThunderbird
| Announcement ID: | SUSE-SU-2018:3247-1 | 
|---|---|
| Rating: | important | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves 19 vulnerabilities can now be installed.
Description:
This update for MozillaThunderbird to version 60.2.1 fixes the following issues:
Update to Thunderbird 60.2.1:
- Calendar: Default values for the first day of the week and working days are now derived from the selected datetime formatting locale
 - Calendar: Switch to a Photon-style icon set for all platforms
 - Fix multiple requests for master password when Google Mail or Calendar OAuth2 is enabled
 - Fix scrollbar of the address entry auto-complete popup
 - Fix security info dialog in compose window not showing certificate status
 - Fix links in the Add-on Manager's search results and theme browsing tabs that opened in external browser
 - Fix localization not showing the localized name for the "Drafts" and "Sent" folders for certain IMAP providers
 - Fix replying to a message with an empty subject which inserted Re: twice
 - Fix spellcheck marks disappeaing erroneously for words with an apostrophe
 - Calendar: First day of the week can now be set
 - Calendar: Several fixes related to cutting/deleting of events and email schedulin
 
These security issues were fixed:
- CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998).
 - CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998).
 - CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998).
 - CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998).
 - CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998).
 - CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998).
 - CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998).
 - CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998).
 - CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998).
 - CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998).
 - CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998).
 - CVE-2018-5187: Various memory safety bugs (bsc#1098998).
 - CVE-2018-5188: Various memory safety bugs (bsc#1098998).
 - CVE-2018-12377: Prevent use-after-free in refresh driver timers (bsc#1107343)
 - CVE-2018-12378: Prevent use-after-free in IndexedDB (bsc#1107343)
 - CVE-2017-16541: Prevent proxy bypass using automount and autofs (bsc#1066489)
 - CVE-2018-12376: Fixed various memory safety bugs (bsc#1107343)
 - CVE-2018-12385: Fixed crash in TransportSecurityInfo due to cached data (bsc#1109363)
 - CVE-2018-12383: Fixed that setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)
 
These can not, in general, be exploited through email, but are potential risks in browser or browser-like contexts.
These non-security issues were fixed:
- Storing of remote content settings fixed (bsc#1084603)
 - Improved message handling and composing
 - Improved handling of message templates
 - Support for OAuth2 and FIDO U2F
 - Various Calendar improvements
 - Various fixes and changes to e-mail workflow
 - Various IMAP fixes
 - Native desktop notifications
 - Fix date display issues (bsc#1109379)
 - Fix start-up crash due to folder name with special characters (bsc#1107772)
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Workstation Extension 15
                
                    
                        
zypper in -t patch SUSE-SLE-Product-WE-15-2018-2333=1 
Package List:
- 
                    SUSE Linux Enterprise Workstation Extension 15 (x86_64)
                    
- MozillaThunderbird-60.2.1-3.13.1
 - MozillaThunderbird-debuginfo-60.2.1-3.13.1
 - MozillaThunderbird-translations-other-60.2.1-3.13.1
 - MozillaThunderbird-translations-common-60.2.1-3.13.1
 - MozillaThunderbird-debugsource-60.2.1-3.13.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2017-16541.html
 - https://www.suse.com/security/cve/CVE-2018-12359.html
 - https://www.suse.com/security/cve/CVE-2018-12360.html
 - https://www.suse.com/security/cve/CVE-2018-12361.html
 - https://www.suse.com/security/cve/CVE-2018-12362.html
 - https://www.suse.com/security/cve/CVE-2018-12363.html
 - https://www.suse.com/security/cve/CVE-2018-12364.html
 - https://www.suse.com/security/cve/CVE-2018-12365.html
 - https://www.suse.com/security/cve/CVE-2018-12366.html
 - https://www.suse.com/security/cve/CVE-2018-12367.html
 - https://www.suse.com/security/cve/CVE-2018-12371.html
 - https://www.suse.com/security/cve/CVE-2018-12376.html
 - https://www.suse.com/security/cve/CVE-2018-12377.html
 - https://www.suse.com/security/cve/CVE-2018-12378.html
 - https://www.suse.com/security/cve/CVE-2018-12383.html
 - https://www.suse.com/security/cve/CVE-2018-12385.html
 - https://www.suse.com/security/cve/CVE-2018-5156.html
 - https://www.suse.com/security/cve/CVE-2018-5187.html
 - https://www.suse.com/security/cve/CVE-2018-5188.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1066489
 - https://bugzilla.suse.com/show_bug.cgi?id=1084603
 - https://bugzilla.suse.com/show_bug.cgi?id=1098998
 - https://bugzilla.suse.com/show_bug.cgi?id=1107343
 - https://bugzilla.suse.com/show_bug.cgi?id=1107772
 - https://bugzilla.suse.com/show_bug.cgi?id=1109363
 - https://bugzilla.suse.com/show_bug.cgi?id=1109379