ArchLinux: 201505-13: thunderbird: multiple issues
Summary
- CVE-2015-2708 (Memory safety bugs fixed in Firefox ESR 31.7 and
Firefox 38):
Jesse Ruderman, Mats Palmgren, Byron Campen, and Steve Fink reported
memory safety problems and crashes that affect Firefox ESR 31.6 and
Firefox 37.
- CVE-2015-2709 (Memory safety bugs fixed in Firefox 38):
Gary Kwong, Andrew McCreight, Christian Holler, Jesse Ruderman, Mats
Palmgren, Jon Coppeard, and Milan Sreckovic reported memory safety
problems and crashes that affect Firefox 37.
- CVE-2015-2710 (Buffer overflow with SVG content and CSS):
Using the Address Sanitizer tool, security researcher Atte Kettunen
found a buffer overflow during the rendering of SVG format graphics when
combined with specific CSS properties on a page. This results in a
potentially exploitable crash.
- CVE-2015-2713 (Use-after-free during text processing with vertical
text enabled):
Security researcher Scott Bell used the Address Sanitizer tool to
discover a use-after-free error during the processing of text when
vertical text is enabled. This leads to a potentially exploitable crash.
- CVE-2015-2716 (Buffer overflow when parsing compressed XML):
Security researcher Ucha Gobejishvili used the Address Sanitizer tool to
find a buffer overflow while parsing compressed XML content. This was
due to an error in how buffer space is created and modified when
handling large amounts of XML data. This results in a potentially
exploitable crash.
Resolution
Upgrade to 31.7.0-1.
# pacman -Syu "thunderbird>=31.7.0-1"
The problem has been fixed upstream in version 31.7.0.
References
https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
![Dist Arch](/images/distros/dist-arch.png)
Workaround
CVE-2015-2708, CVE-2015-2709, CVE-2015-2710 and CVE-2015-2716 cannot be
exploited through email in the Thunderbird product because scripting is
disabled, but are potentially a risk in browser or browser-like contexts.
There is no workaround for CVE-2015-2713.