Advisories ยป MGASA-2018-0207

Updated thunderbird packages fix bugs and security vulnerabilities

Publication date: 20 Apr 2018
Modification date: 20 Apr 2018
Type: security
Affected Mageia releases : 5
CVE: CVE-2018-5125 , CVE-2018-5127 , CVE-2018-5129 , CVE-2018-5144 , CVE-2018-5145 , CVE-2018-5146

Description

* A buffer overflow can occur when manipulating the SVG
animatedPathSegList through script. This results in a potentially
exploitable crash (CVE-2018-5127).
* A lack of parameter validation on IPC messages results in a potential
out-of-bounds write through malformed IPC messages. This can potentially
allow for sandbox escape through memory corruption in the parent process
(CVE-2018-5129).
* An integer overflow can occur during conversion of text to some
Unicode character sets due to an unchecked length parameter
(CVE-2018-5144).
* An out of bounds memory write while processing Vorbis audio data was
reported through the Pwn2Own contest (CVE-2018-5146).
* Mozilla developers and community members reported memory safety bugs
present in Firefox 58, Firefox ESR 52.6, and Thunderbird 52.6. Some of
these bugs showed evidence of memory corruption and we presume that with
enough effort that some of these could be exploited to run arbitrary
code (CVE-2018-5125).
* Mozilla developers reported memory safety bugs present in Firefox
ESR 52.6 and Thunderbird 52.6. These bugs showed evidence of memory
corruption and we presume that with enough effort that some of these
could be exploited to run arbitrary code (CVE-2018-5145).
                

References

SRPMS

5/core