openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:2330-1
Rating: important
References: #1020631 #1062195 #1076907 #1077291 #1098998
Cross-References: CVE-2018-12359 CVE-2018-12360 CVE-2018-12362
CVE-2018-12363 CVE-2018-12364 CVE-2018-12365
CVE-2018-12366 CVE-2018-5156 CVE-2018-5188
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for seamonkey fixes the following issues:
Mozilla Seamonkey was updated to 2.49.4:
Now uses Gecko 52.9.1esr (boo#1098998).
Security issues fixed with MFSA 2018-16 (boo#1098998):
* CVE-2018-12359: Buffer overflow using computed size of canvas element
* CVE-2018-12360: Use-after-free when using focus()
* CVE-2018-12362: Integer overflow in SSSE3 scaler
* CVE-2018-5156: Media recorder segmentation fault when track type is
changed during capture
* CVE-2018-12363: Use-after-free when appending DOM nodes
* CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
* CVE-2018-12365: Compromised IPC child process can list local filenames
* CVE-2018-12366: Invalid data handling during QCMS transformations
* CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1,
and Firefox ESR 52.9
Localizations finally included again (boo#1062195)
Updated summary and description to more accurately reflect what SeaMonkey
is, giving less prominence to the long- discontinued Mozilla Application
Suite that many users may no longer be familiar with
Update to Seamonkey 2.49.2
* Gecko 52.6esr (including security relevant fixes) (boo#1077291)
* fix issue in Composer
* With some themes, the menulist- and history-dropmarker didn’t show
* Scrollbars didn’t show the buttons
* WebRTC has been disabled by default. It needs an add-on to enable it per
site
* The active title bar was not visually emphasized
Correct requires and provides handling (boo#1076907)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-867=1
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-867=1
Package List:
– openSUSE Leap 42.3 (i586 x86_64):
seamonkey-2.49.4-13.3.2
seamonkey-debuginfo-2.49.4-13.3.2
seamonkey-debugsource-2.49.4-13.3.2
seamonkey-translations-common-2.49.4-13.3.2
seamonkey-translations-other-2.49.4-13.3.2
– openSUSE Leap 15.0 (x86_64):
seamonkey-2.49.4-lp150.2.3.2
seamonkey-debuginfo-2.49.4-lp150.2.3.2
seamonkey-debugsource-2.49.4-lp150.2.3.2
seamonkey-translations-common-2.49.4-lp150.2.3.2
seamonkey-translations-other-2.49.4-lp150.2.3.2
References:
https://www.suse.com/security/cve/CVE-2018-12359.html
https://www.suse.com/security/cve/CVE-2018-12360.html
https://www.suse.com/security/cve/CVE-2018-12362.html
https://www.suse.com/security/cve/CVE-2018-12363.html
https://www.suse.com/security/cve/CVE-2018-12364.html
https://www.suse.com/security/cve/CVE-2018-12365.html
https://www.suse.com/security/cve/CVE-2018-12366.html
https://www.suse.com/security/cve/CVE-2018-5156.html
https://www.suse.com/security/cve/CVE-2018-5188.html
https://bugzilla.suse.com/1020631
https://bugzilla.suse.com/1062195
https://bugzilla.suse.com/1076907
https://bugzilla.suse.com/1077291
https://bugzilla.suse.com/1098998
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org