{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaThunderbird":"60.2.1-3.13.1","MozillaThunderbird-translations-common":"60.2.1-3.13.1","MozillaThunderbird-translations-other":"60.2.1-3.13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15","name":"MozillaThunderbird","purl":"pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"60.2.1-3.13.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaThunderbird to version 60.2.1 fixes the following issues:\n\nUpdate to Thunderbird 60.2.1:\n\n* Calendar: Default values for the first day of the week and\n  working days are now derived from the selected datetime\n  formatting locale\n* Calendar: Switch to a Photon-style icon set for all platforms\n* Fix multiple requests for master password when Google Mail or\n  Calendar OAuth2 is enabled\n* Fix scrollbar of the address entry auto-complete popup\n* Fix security info dialog in compose window not showing \n  certificate status\n* Fix links in the Add-on Manager's search results and theme\n  browsing tabs that opened in external browser\n* Fix localization not showing the localized name for the\n  'Drafts' and 'Sent' folders for certain IMAP providers\n* Fix replying to a message with an empty subject which\n  inserted Re: twice\n* Fix spellcheck marks disappeaing erroneously for words with\n  an apostrophe\n* Calendar: First day of the week can now be set\n* Calendar: Several fixes related to cutting/deleting of events\n  and email schedulin\n\nThese security issues were fixed:\n\n- CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998).\n- CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998).\n- CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998).\n- CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998).\n- CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998).\n- CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998).\n- CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998).\n- CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998).\n- CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998).\n- CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998).\n- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998).\n- CVE-2018-5187: Various memory safety bugs (bsc#1098998).\n- CVE-2018-5188: Various memory safety bugs (bsc#1098998).\n- CVE-2018-12377: Prevent use-after-free in refresh driver timers (bsc#1107343)\n- CVE-2018-12378: Prevent use-after-free in IndexedDB (bsc#1107343)\n- CVE-2017-16541: Prevent proxy bypass using automount and autofs (bsc#1066489)\n- CVE-2018-12376: Fixed various memory safety bugs (bsc#1107343)\n- CVE-2018-12385: Fixed crash in TransportSecurityInfo due to cached data (bsc#1109363)\n- CVE-2018-12383: Fixed that setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)\n\nThese can not, in general, be exploited through email, but are potential risks\nin browser or browser-like contexts.\n\nThese non-security issues were fixed:\n\n- Storing of remote content settings fixed (bsc#1084603)\n- Improved message handling and composing\n- Improved handling of message templates\n- Support for OAuth2 and FIDO U2F\n- Various Calendar improvements\n- Various fixes and changes to e-mail workflow \n- Various IMAP fixes\n- Native desktop notifications\n- Fix date display issues (bsc#1109379)\n- Fix start-up crash due to folder name with special characters\n  (bsc#1107772)\n","id":"SUSE-SU-2018:3247-1","modified":"2018-10-19T12:59:14Z","published":"2018-10-19T12:59:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20183247-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1066489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084603"},{"type":"REPORT","url":"https://bugzilla.suse.com/1098998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109363"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16541"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12363"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12364"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12366"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12367"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12371"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12376"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12377"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12383"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12385"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5188"}],"related":["CVE-2017-16541","CVE-2018-12359","CVE-2018-12360","CVE-2018-12361","CVE-2018-12362","CVE-2018-12363","CVE-2018-12364","CVE-2018-12365","CVE-2018-12366","CVE-2018-12367","CVE-2018-12371","CVE-2018-12376","CVE-2018-12377","CVE-2018-12378","CVE-2018-12383","CVE-2018-12385","CVE-2018-5156","CVE-2018-5187","CVE-2018-5188"],"summary":"Security update for MozillaThunderbird","upstream":["CVE-2017-16541","CVE-2018-12359","CVE-2018-12360","CVE-2018-12361","CVE-2018-12362","CVE-2018-12363","CVE-2018-12364","CVE-2018-12365","CVE-2018-12366","CVE-2018-12367","CVE-2018-12371","CVE-2018-12376","CVE-2018-12377","CVE-2018-12378","CVE-2018-12383","CVE-2018-12385","CVE-2018-5156","CVE-2018-5187","CVE-2018-5188"]}