openSUSE Security Update: Security update for seamonkey ______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:2807-1 Rating: important References: #1020631 #1062195 #1076907 #1077291 #1098998
Cross-References: CVE-2018-12359 CVE-2018-12360 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366 CVE-2018-5156 CVE-2018-5188
Affected Products: openSUSE Backports SLE-15 ______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
This update for seamonkey fixes the following issues:
Mozilla Seamonkey was updated to 2.49.4:
Now uses Gecko 52.9.1esr (boo#1098998).
Security issues fixed with MFSA 2018-16 (boo#1098998):
* CVE-2018-12359: Buffer overflow using computed size of canvas element * CVE-2018-12360: Use-after-free when using focus() * CVE-2018-12362: Integer overflow in SSSE3 scaler * CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture * CVE-2018-12363: Use-after-free when appending DOM nodes * CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins * CVE-2018-12365: Compromised IPC child process can list local filenames * CVE-2018-12366: Invalid data handling during QCMS transformations * CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9
Localizations finally included again (boo#1062195)
Updated summary and description to more accurately reflect what SeaMonkey is, giving less prominence to the long- discontinued Mozilla Application Suite that many users may no longer be familiar with
Update to Seamonkey 2.49.2
* Gecko 52.6esr (including security relevant fixes) (boo#1077291) * fix issue in Composer * With some themes, the menulist- and history-dropmarker didn't show * Scrollbars didn't show the buttons * WebRTC has been disabled by default. It needs an add-on to enable it per site * The active title bar was not visually emphasized
Correct requires and provides handling (boo#1076907)
This update was imported from the openSUSE:Leap:15.0:Update update project.
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-873=1
- openSUSE Backports SLE-15 (aarch64 x86_64):
seamonkey-2.49.4-bp220.127.116.11 seamonkey-debuginfo-2.49.4-bp18.104.22.168 seamonkey-debugsource-2.49.4-bp22.214.171.124 seamonkey-translations-common-2.49.4-bp126.96.36.199 seamonkey-translations-other-2.49.4-bp188.8.131.52
https://www.suse.com/security/cve/CVE-2018-12359.html https://www.suse.com/security/cve/CVE-2018-12360.html https://www.suse.com/security/cve/CVE-2018-12362.html https://www.suse.com/security/cve/CVE-2018-12363.html https://www.suse.com/security/cve/CVE-2018-12364.html https://www.suse.com/security/cve/CVE-2018-12365.html https://www.suse.com/security/cve/CVE-2018-12366.html https://www.suse.com/security/cve/CVE-2018-5156.html https://www.suse.com/security/cve/CVE-2018-5188.html https://bugzilla.suse.com/1020631 https://bugzilla.suse.com/1062195 https://bugzilla.suse.com/1076907 https://bugzilla.suse.com/1077291 https://bugzilla.suse.com/1098998