Updated thunderbird packages fix security vulnerabilities
Publication date: 23 Jul 2018Modification date: 23 Jul 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-5188 , CVE-2018-12019 , CVE-2018-12020 , CVE-2018-12359 , CVE-2018-12360 , CVE-2018-12362 , CVE-2018-12363 , CVE-2018-12364 , CVE-2018-12365 , CVE-2018-12366 , CVE-2018-12372 , CVE-2018-12373 , CVE-2018-12374
Description
The updated packages fix several bugs and some security issues: Buffer overflow using computed size of canvas element. (CVE-2018-12359) Use-after-free when using focus(). (CVE-2018-12360) S/MIME and PGP decryption oracles can be built with HTML emails. (CVE-2018-12372) S/MIME plaintext can be leaked through HTML reply/forward. (CVE-2018-12373) Integer overflow in SSSE3 scaler. (CVE-2018-12362) Use-after-free when appending DOM nodes. (CVE-2018-12363) CSRF attacks through 307 redirects and NPAPI plugins. (CVE-2018-12364) Compromised IPC child process can list local filenames. (CVE-2018-12365) Invalid data handling during QCMS transformations. (CVE-2018-12366) Using form to exfiltrate encrypted mail part by pressing enter in form field. (CVE-2018-12374) Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, Firefox ESR 52.9, and Thunderbird 52.9. (CVE-2018-5188) The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids. (CVE-2018-12019) mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. (CVE-2018-12020)
References
- https://bugs.mageia.org/show_bug.cgi?id=23277
- https://www.thunderbird.net/en-US/thunderbird/52.9.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/52.9.1/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2018-18/
- https://lists.opensuse.org/opensuse-updates/2018-05/msg00133.html
- https://neopg.io/blog/enigmail-signature-spoof/
- http://openwall.com/lists/oss-security/2018/06/13/10
- https://neopg.io/blog/gpg-signature-spoof/
- https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
- https://lists.opensuse.org/opensuse-updates/2018-06/msg00094.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374
SRPMS
6/core
- thunderbird-52.9.1-1.mga6
- thunderbird-l10n-52.9.1-1.mga6