{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaThunderbird":"60.3.0-74.2","MozillaThunderbird-buildsymbols":"60.3.0-74.2","MozillaThunderbird-translations-common":"60.3.0-74.2","MozillaThunderbird-translations-other":"60.3.0-74.2"}]},"package":{"ecosystem":"SUSE:Package Hub 12","name":"MozillaThunderbird","purl":"pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Package%20Hub%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"60.3.0-74.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for Mozilla Thunderbird to version 60.2.1 fixes multiple issues.\n\nMultiple security issues were fixed in the Mozilla platform as advised in MFSA 2018-25 and MFSA 2018-28.\nIn general, these flaws cannot be exploited through email in Thunderbird because scripting\nis disabled when reading mail, but are potentially risks in browser or browser-like contexts:\n\n- CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998)\n- CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998)\n- CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998)\n- CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998)\n- CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998)\n- CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998)\n- CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998)\n- CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998)\n- CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998)\n- CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998)\n- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998)\n- CVE-2018-5187: Various memory safety bugs (bsc#1098998)\n- CVE-2018-5188: Various memory safety bugs (bsc#1098998)\n- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343)\n- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343)\n- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1066489)\n- CVE-2018-12376: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (bsc#1107343)\n- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data (bsc#1109363)\n- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)\n- CVE-2018-12389: Fixed memory safety bugs (bsc#1112852)\n- CVE-2018-12390: Fixed memory safety bugs (bsc#1112852)\n- CVE-2018-12391: Fixed HTTP Live Stream audio data is accessible cross-origin (bsc#1112852)\n- CVE-2018-12392: Fixed crash with nested event loops (bsc#1112852)\n- CVE-2018-12393: Fixed integer overflow during Unicode conversion while loading JavaScript (bsc#1112852)\n    \nThese non-security issues were fixed:\n\n- Fix date display issues (bsc#1109379)\n- Fix start-up crash due to folder name with special characters (bsc#1107772)\n- Storing of remote content settings fixed (bsc#1084603)\n- Improved message handling and composing\n- Improved handling of message templates\n- Support for OAuth2 and FIDO U2F\n- Various Calendar improvements\n- Various fixes and changes to e-mail workflow \n- Various IMAP fixes\n- Native desktop notifications\n- various theme fixes\n- Shift+PageUp/PageDown in Write window\n- Gloda attachment filtering\n- Mailing list address auto-complete enter/return handling\n- Thunderbird hung if HTML signature references non-existent image\n- Filters not working for headers that appear more than once\n  ","id":"openSUSE-SU-2018:3687-1","modified":"2018-11-09T08:34:29Z","published":"2018-11-09T08:34:29Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4"},{"type":"REPORT","url":"https://bugzilla.suse.com/1066489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084603"},{"type":"REPORT","url":"https://bugzilla.suse.com/1098998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109363"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109379"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16541"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12363"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12364"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12366"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12367"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12371"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12376"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12377"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12383"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12385"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12389"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12390"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12392"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12393"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16541"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5188"}],"related":["CVE-2017-16541","CVE-2018-12359","CVE-2018-12360","CVE-2018-12361","CVE-2018-12362","CVE-2018-12363","CVE-2018-12364","CVE-2018-12365","CVE-2018-12366","CVE-2018-12367","CVE-2018-12371","CVE-2018-12376","CVE-2018-12377","CVE-2018-12378","CVE-2018-12383","CVE-2018-12385","CVE-2018-12389","CVE-2018-12390","CVE-2018-12391","CVE-2018-12392","CVE-2018-12393","CVE-2018-16541","CVE-2018-5156","CVE-2018-5187","CVE-2018-5188"],"summary":"Security update for MozillaThunderbird","upstream":["CVE-2017-16541","CVE-2018-12359","CVE-2018-12360","CVE-2018-12361","CVE-2018-12362","CVE-2018-12363","CVE-2018-12364","CVE-2018-12365","CVE-2018-12366","CVE-2018-12367","CVE-2018-12371","CVE-2018-12376","CVE-2018-12377","CVE-2018-12378","CVE-2018-12383","CVE-2018-12385","CVE-2018-12389","CVE-2018-12390","CVE-2018-12391","CVE-2018-12392","CVE-2018-12393","CVE-2018-16541","CVE-2018-5156","CVE-2018-5187","CVE-2018-5188"]}