[SUSE-SU-2018:2174-1] Security update for Mozilla Thunderbird

Severity Moderate
CVEs 11

Security update for Mozilla Thunderbird

This update for Mozilla Thunderbird to version 52.9.1 fixes multiple issues.

Security issues fixed, inherited from the Mozilla common code base (MFSA 2018-16, bsc#1098998):

  • CVE-2018-12359: Buffer overflow using computed size of canvas element
  • CVE-2018-12360: Use-after-free when using focus()
  • CVE-2018-12362: Integer overflow in SSSE3 scaler
  • CVE-2018-12363: Use-after-free when appending DOM nodes
  • CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
  • CVE-2018-12365: Compromised IPC child process can list local filenames
  • CVE-2018-12366: Invalid data handling during QCMS transformations
  • CVE-2018-5188: Memory safety bugs fixed in Thunderbird 52.9.0

Security issues fixed that affect e-mail privacy and integrity (including EFAIL):

  • CVE-2018-12372: S/MIME and PGP decryption oracles can be built with HTML emails (bsc#1100082)
  • CVE-2018-12373: S/MIME plaintext can be leaked through HTML reply/forward (bsc#1100079)
  • CVE-2018-12374: Using form to exfiltrate encrypted mail part by pressing enter in form field (bsc#1100081)

The following options are available for added security in certain scenarios:

  • Option for not decrypting subordinate message parts that otherwise might reveal decryted content to the attacker. Preference mailnews.p7m_subparts_external needs to be set to true for added security.

The following upstream changes are included:

  • Thunderbird will now prompt to compact IMAP folders even if the account is online
  • Fix various problems when forwarding messages inline when using 'simple' HTML view
  • Deleting or detaching attachments corrupted messages under certain circumstances (bsc#1100780)

The following tracked packaging changes are included:

  • correct requires and provides handling (boo#1076907)
  • reduce memory footprint with %ix86 at linking time via additional compiler flags (boo#1091376)
  • Build from upstream source archive and verify source signature (boo#1085780)
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2174-1.json
Suse URL for SUSE-SU-2018:2174-1 https://www.suse.com/support/update/announcement/2018/suse-su-20182174-1/
Suse E-Mail link for SUSE-SU-2018:2174-1 https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html
Bugzilla SUSE Bug 1076907 https://bugzilla.suse.com/1076907
Bugzilla SUSE Bug 1085780 https://bugzilla.suse.com/1085780
Bugzilla SUSE Bug 1091376 https://bugzilla.suse.com/1091376
Bugzilla SUSE Bug 1098998 https://bugzilla.suse.com/1098998
Bugzilla SUSE Bug 1100079 https://bugzilla.suse.com/1100079
Bugzilla SUSE Bug 1100081 https://bugzilla.suse.com/1100081
Bugzilla SUSE Bug 1100082 https://bugzilla.suse.com/1100082
Bugzilla SUSE Bug 1100780 https://bugzilla.suse.com/1100780
CVE SUSE CVE CVE-2018-12359 page https://www.suse.com/security/cve/CVE-2018-12359/
CVE SUSE CVE CVE-2018-12360 page https://www.suse.com/security/cve/CVE-2018-12360/
CVE SUSE CVE CVE-2018-12362 page https://www.suse.com/security/cve/CVE-2018-12362/
CVE SUSE CVE CVE-2018-12363 page https://www.suse.com/security/cve/CVE-2018-12363/
CVE SUSE CVE CVE-2018-12364 page https://www.suse.com/security/cve/CVE-2018-12364/
CVE SUSE CVE CVE-2018-12365 page https://www.suse.com/security/cve/CVE-2018-12365/
CVE SUSE CVE CVE-2018-12366 page https://www.suse.com/security/cve/CVE-2018-12366/
CVE SUSE CVE CVE-2018-12372 page https://www.suse.com/security/cve/CVE-2018-12372/
CVE SUSE CVE CVE-2018-12373 page https://www.suse.com/security/cve/CVE-2018-12373/
CVE SUSE CVE CVE-2018-12374 page https://www.suse.com/security/cve/CVE-2018-12374/
CVE SUSE CVE CVE-2018-5188 page https://www.suse.com/security/cve/CVE-2018-5188/
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...