OPENSUSE-SU-2024:0381-1

Vulnerability from csaf_opensuse - Published: 2024-11-28 17:32 - Updated: 2024-11-28 17:32
Summary
Security update for seamonkey

Notes

Title of the patch
Security update for seamonkey
Description of the patch
This update for seamonkey fixes the following issues: Update to SeaMonkey 2.53.19: * Cancel button in SeaMonkey bookmarking star ui not working bug 1872623. * Remove OfflineAppCacheHelper.jsm copy from SeaMonkey and use the one in toolkit bug 1896292. * Remove obsolete registerFactoryLocation calls from cZ bug 1870930. * Remove needless implements='nsIDOMEventListener' and QI bug 1611010. * Replace use of nsIStandardURL::Init bug 1864355. * Switch SeaMonkey website from hg.mozilla.org to heptapod. bug 1870934. * Allow view-image to open a data: URI by setting a flag on the loadinfo bug 1877001. * Save-link-as feature should use the loading principal and context menu using nsIContentPolicy.TYPE_SAVE_AS_DOWNLOAD bug 1879726. * Use punycode in SeaMonkey JS bug 1864287. * Font lists in preferences are no longer grouped by font type, port asynchronous handling like Bug 1399206 bug 1437393. * SeaMonkey broken tab after undo closed tab with invalid protocol bug 1885748. * SeaMonkey session restore is missing the checkboxes in the Classic theme bug 1896174. * Implement about:credits on seamonkey-project.org website bug 1898467. * Fix for the 0.0.0.0 day vulnerability oligo summary. * Link in update notification does not open Browser bug 1888364. * Update ReadExtensionPrefs in Preferences.cpp bug 1890196. * Add about:seamonkey page to SeaMonkey bug 1897801. * SeaMonkey 2.53.19 uses the same backend as Firefox and contains the relevant Firefox 60.8 security fixes. * SeaMonkey 2.53.19 shares most parts of the mail and news code with Thunderbird. Please read the Thunderbird 60.8.0 release notes for specific security fixes in this release. * Additional important security fixes up to Current Firefox 115.14 and Thunderbird 115.14 ESR plus many enhancements have been backported. We will continue to enhance SeaMonkey security in subsequent 2.53.x beta and release versions as fast as we are able to.
Patchnames
openSUSE-2024-381
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for seamonkey",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for seamonkey fixes the following issues:\n\nUpdate to SeaMonkey 2.53.19:\n\n  * Cancel button in SeaMonkey bookmarking star ui not working bug\n    1872623.\n  * Remove OfflineAppCacheHelper.jsm copy from SeaMonkey and use the\n    one in toolkit bug 1896292.\n  * Remove obsolete registerFactoryLocation calls from cZ bug 1870930.\n  * Remove needless implements=\u0027nsIDOMEventListener\u0027 and QI bug\n    1611010.\n  * Replace use of nsIStandardURL::Init bug 1864355.\n  * Switch SeaMonkey website from hg.mozilla.org to heptapod. bug\n    1870934.\n  * Allow view-image to open a data: URI by setting a flag on the\n    loadinfo bug 1877001.\n  * Save-link-as feature should use the loading principal and context\n    menu using nsIContentPolicy.TYPE_SAVE_AS_DOWNLOAD bug 1879726.\n  * Use punycode in SeaMonkey JS bug 1864287.\n  * Font lists in preferences are no longer grouped by font type, port\n    asynchronous handling like Bug 1399206 bug 1437393.\n  * SeaMonkey broken tab after undo closed tab with invalid protocol\n    bug 1885748.\n  * SeaMonkey session restore is missing the checkboxes in the Classic\n    theme bug 1896174.\n  * Implement about:credits on seamonkey-project.org website bug\n    1898467.\n  * Fix for the 0.0.0.0 day vulnerability oligo summary.\n  * Link in update notification does not open Browser bug 1888364.\n  * Update ReadExtensionPrefs in Preferences.cpp bug 1890196.\n  * Add about:seamonkey page to SeaMonkey bug 1897801.\n  * SeaMonkey 2.53.19 uses the same backend as Firefox and contains\n    the relevant Firefox 60.8 security fixes.\n  * SeaMonkey 2.53.19 shares most parts of the mail and news code with\n    Thunderbird. Please read the Thunderbird 60.8.0 release notes for\n    specific security fixes in this release.\n  * Additional important security fixes up to Current Firefox 115.14\n    and Thunderbird 115.14 ESR plus many enhancements have been\n    backported. We will continue to enhance SeaMonkey security in\n    subsequent 2.53.x beta and release versions as fast as we are able\n    to.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2024-381",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0381-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2024:0381-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCBM65JXGQLO4VAA4PM3Q466RSC2IZRV/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2024:0381-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCBM65JXGQLO4VAA4PM3Q466RSC2IZRV/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230257",
        "url": "https://bugzilla.suse.com/1230257"
      }
    ],
    "title": "Security update for seamonkey",
    "tracking": {
      "current_release_date": "2024-11-28T17:32:42Z",
      "generator": {
        "date": "2024-11-28T17:32:42Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:0381-1",
      "initial_release_date": "2024-11-28T17:32:42Z",
      "revision_history": [
        {
          "date": "2024-11-28T17:32:42Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "seamonkey-2.53.19-bp155.2.23.1.i586",
                "product": {
                  "name": "seamonkey-2.53.19-bp155.2.23.1.i586",
                  "product_id": "seamonkey-2.53.19-bp155.2.23.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586",
                "product": {
                  "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586",
                  "product_id": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-irc-2.53.19-bp155.2.23.1.i586",
                "product": {
                  "name": "seamonkey-irc-2.53.19-bp155.2.23.1.i586",
                  "product_id": "seamonkey-irc-2.53.19-bp155.2.23.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "seamonkey-2.53.19-bp155.2.23.1.x86_64",
                "product": {
                  "name": "seamonkey-2.53.19-bp155.2.23.1.x86_64",
                  "product_id": "seamonkey-2.53.19-bp155.2.23.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64",
                "product": {
                  "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64",
                  "product_id": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64",
                "product": {
                  "name": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64",
                  "product_id": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Package Hub 15 SP5",
                "product": {
                  "name": "SUSE Package Hub 15 SP5",
                  "product_id": "SUSE Package Hub 15 SP5"
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.19-bp155.2.23.1.i586 as component of SUSE Package Hub 15 SP5",
          "product_id": "SUSE Package Hub 15 SP5:seamonkey-2.53.19-bp155.2.23.1.i586"
        },
        "product_reference": "seamonkey-2.53.19-bp155.2.23.1.i586",
        "relates_to_product_reference": "SUSE Package Hub 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.19-bp155.2.23.1.x86_64 as component of SUSE Package Hub 15 SP5",
          "product_id": "SUSE Package Hub 15 SP5:seamonkey-2.53.19-bp155.2.23.1.x86_64"
        },
        "product_reference": "seamonkey-2.53.19-bp155.2.23.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586 as component of SUSE Package Hub 15 SP5",
          "product_id": "SUSE Package Hub 15 SP5:seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586",
        "relates_to_product_reference": "SUSE Package Hub 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64 as component of SUSE Package Hub 15 SP5",
          "product_id": "SUSE Package Hub 15 SP5:seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.19-bp155.2.23.1.i586 as component of SUSE Package Hub 15 SP5",
          "product_id": "SUSE Package Hub 15 SP5:seamonkey-irc-2.53.19-bp155.2.23.1.i586"
        },
        "product_reference": "seamonkey-irc-2.53.19-bp155.2.23.1.i586",
        "relates_to_product_reference": "SUSE Package Hub 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64 as component of SUSE Package Hub 15 SP5",
          "product_id": "SUSE Package Hub 15 SP5:seamonkey-irc-2.53.19-bp155.2.23.1.x86_64"
        },
        "product_reference": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.19-bp155.2.23.1.i586 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:seamonkey-2.53.19-bp155.2.23.1.i586"
        },
        "product_reference": "seamonkey-2.53.19-bp155.2.23.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.19-bp155.2.23.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:seamonkey-2.53.19-bp155.2.23.1.x86_64"
        },
        "product_reference": "seamonkey-2.53.19-bp155.2.23.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.19-bp155.2.23.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.19-bp155.2.23.1.i586 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:seamonkey-irc-2.53.19-bp155.2.23.1.i586"
        },
        "product_reference": "seamonkey-irc-2.53.19-bp155.2.23.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:seamonkey-irc-2.53.19-bp155.2.23.1.x86_64"
        },
        "product_reference": "seamonkey-irc-2.53.19-bp155.2.23.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…