Advisories ยป MGASA-2016-0409

Updated thunderbird packages fix security vulnerabilities

Publication date: 05 Dec 2016
Modification date: 05 Dec 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-5296 , CVE-2016-5294 , CVE-2016-5297 , CVE-2016-9066 , CVE-2016-5291 , CVE-2016-5290 , CVE-2016-9079

Description

A heap-buffer-overflow in Cairo when processing SVG content caused by
compiler optimization, resulting in a potentially exploitable crash
(CVE-2016-5296).

The Mozilla Updater can be made to choose an arbitrary target working
directory for output files resulting from the update process. This
vulnerability requires local system access (CVE-2016-5294).

An error in argument length checking in JavaScript, leading to potential
integer overflows or other bounds checking issues (CVE-2016-5297).

A buffer overflow resulting in a potentially exploitable crash due to
memory allocation issues when handling large amounts of incoming data
(CVE-2016-9066).

A same-origin policy bypass with local shortcut files to load arbitrary
local content from disk (CVE-2016-5291).

Mozilla developers and community members Olli Pettay, Christian Holler,
Ehsan Akhgari, Jon Coppeard, Gary Kwong, Tooru Fujisawa, Philipp, and
Randell Jesup reported memory safety bugs present in Thunderbird ESR
45.4. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort that some of these could be exploited to
run arbitrary code (CVE-2016-5290).

A use-after-free vulnerability in SVG Animation has been discovered. An
exploit built on this vulnerability has been discovered in the wild
targeting Firefox and Tor Browser users on Windows (CVE-2016-9079).
                

References

SRPMS

5/core