openSUSE Security Update: Security update for seamonkey ______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:2330-1 Rating: important References: #1020631 #1062195 #1076907 #1077291 #1098998
Cross-References: CVE-2018-12359 CVE-2018-12360 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366 CVE-2018-5156 CVE-2018-5188
Affected Products: openSUSE Leap 42.3 openSUSE Leap 15.0 ______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for seamonkey fixes the following issues:
Mozilla Seamonkey was updated to 2.49.4:
Now uses Gecko 52.9.1esr (boo#1098998).
Security issues fixed with MFSA 2018-16 (boo#1098998):
* CVE-2018-12359: Buffer overflow using computed size of canvas element * CVE-2018-12360: Use-after-free when using focus() * CVE-2018-12362: Integer overflow in SSSE3 scaler * CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture * CVE-2018-12363: Use-after-free when appending DOM nodes * CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins * CVE-2018-12365: Compromised IPC child process can list local filenames * CVE-2018-12366: Invalid data handling during QCMS transformations * CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9
Localizations finally included again (boo#1062195)
Updated summary and description to more accurately reflect what SeaMonkey is, giving less prominence to the long- discontinued Mozilla Application Suite that many users may no longer be familiar with
Update to Seamonkey 2.49.2
* Gecko 52.6esr (including security relevant fixes) (boo#1077291) * fix issue in Composer * With some themes, the menulist- and history-dropmarker didn't show * Scrollbars didn't show the buttons * WebRTC has been disabled by default. It needs an add-on to enable it per site * The active title bar was not visually emphasized
Correct requires and provides handling (boo#1076907)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-867=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-867=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
seamonkey-2.49.4-13.3.2 seamonkey-debuginfo-2.49.4-13.3.2 seamonkey-debugsource-2.49.4-13.3.2 seamonkey-translations-common-2.49.4-13.3.2 seamonkey-translations-other-2.49.4-13.3.2
- openSUSE Leap 15.0 (x86_64):
seamonkey-2.49.4-lp150.2.3.2 seamonkey-debuginfo-2.49.4-lp150.2.3.2 seamonkey-debugsource-2.49.4-lp150.2.3.2 seamonkey-translations-common-2.49.4-lp150.2.3.2 seamonkey-translations-other-2.49.4-lp150.2.3.2
References:
https://www.suse.com/security/cve/CVE-2018-12359.html https://www.suse.com/security/cve/CVE-2018-12360.html https://www.suse.com/security/cve/CVE-2018-12362.html https://www.suse.com/security/cve/CVE-2018-12363.html https://www.suse.com/security/cve/CVE-2018-12364.html https://www.suse.com/security/cve/CVE-2018-12365.html https://www.suse.com/security/cve/CVE-2018-12366.html https://www.suse.com/security/cve/CVE-2018-5156.html https://www.suse.com/security/cve/CVE-2018-5188.html https://bugzilla.suse.com/1020631 https://bugzilla.suse.com/1062195 https://bugzilla.suse.com/1076907 https://bugzilla.suse.com/1077291 https://bugzilla.suse.com/1098998