Advisories ยป MGASA-2019-0272

Updated thunderbird packages fix security vulnerabilities

Publication date: 12 Sep 2019
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-11709 , CVE-2019-11710 , CVE-2019-11711 , CVE-2019-11712 , CVE-2019-11713 , CVE-2019-11714 , CVE-2019-11715 , CVE-2019-11716 , CVE-2019-11717 , CVE-2019-11719 , CVE-2019-11720 , CVE-2019-11721 , CVE-2019-11723 , CVE-2019-11724 , CVE-2019-11725 , CVE-2019-11727 , CVE-2019-11728 , CVE-2019-11729 , CVE-2019-11730


This update provides an update to thunderbird 68.0, updates enigmail to
2.1.2 and fixes the following security issues:

Memory safety bugs fixed in Firefox 68, Firefox ESR 60.8, and Thunderbird
68. (CVE-2019-11709)

Memory safety bugs fixed in Firefox 68 and Thunderbird 68. (CVE-2019-11710)

Script injection within domain through inner window reuse. (CVE-2019-11711)

Cross-origin POST requests can be made with NPAPI plugins by following 308
redirects. (CVE-2019-11712)

Use-after-free with HTTP/2 cached stream. (CVE-2019-11713)

NeckoChild can trigger crash when accessed off of main thread.

HTML parsing error can contribute to content XSS. (CVE-2019-11715)

globalThis not enumerable until accessed. (CVE-2019-11716)

Caret character improperly escaped in origins. (CVE-2019-11717)

Out-of-bounds read when importing curve25519 private key. (CVE-2019-11719)

Character encoding XSS vulnerability. (CVE-2019-11720)

Domain spoofing through unicode latin 'kra' character. (CVE-2019-11721)

Cookie leakage during add-on fetching across private browsing boundaries.

Retired site has remote troubleshooting permissions.

Websocket resources bypass safebrowsing protections. (CVE-2019-11725)

PKCS#1 v1.5 signatures can be used for TLS 1.3. (CVE-2019-11727)

Port scanning through Alt-Svc header. (CVE-2019-11728)

Empty or malformed p256-ECDH public keys may trigger a segmentation
fault. (CVE-2019-11729)

Same-origin policy treats all files in a directory as having the
same-origin. (CVE-2019-11730)

NOTE! If your lightning calendar disappears with this update, see the
referenced link in the advisories.