ArchLinux: 201803-22: thunderbird: multiple issues
Summary
- CVE-2018-5125 (arbitrary code execution)
Various memory safety bugs have been found in Thunderbird < 52.7.0 and
Firefox < 59.0, some of them presenting evidence of memory corruption.
Mozilla presumes that with enough effort some of these could be
exploited to run arbitrary code.
- CVE-2018-5127 (arbitrary code execution)
A buffer overflow can occur in Thunderbird < 52.7.0 when manipulating
the SVG animatedPathSegList through script. This results in a
potentially exploitable crash.
- CVE-2018-5129 (access restriction bypass)
A lack of parameter validation on IPC messages results in a potential
out-of-bounds write in Thunderbird < 52.7.0, through malformed IPC
messages. This can potentially allow for sandbox escape through memory
corruption in the parent process.
- CVE-2018-5144 (arbitrary code execution)
An integer overflow can occur during conversion of text to some Unicode
character sets in Thunderbird < 52.7.0, due to an unchecked length
parameter.
- CVE-2018-5145 (arbitrary code execution)
Various memory safety bugs have been found in Thunderbird < 52.7.0,
some of them presenting evidence of memory corruption. Mozilla presumes
that with enough effort some of these could be exploited to run
arbitrary code.
- CVE-2018-5146 (arbitrary code execution)
An out of bounds memory write vulnerability has been discovered in
libvorbis before 1.3.6 while processing Vorbis audio data related to
codebooks that are not an exact divisor of the partition size.
Resolution
Upgrade to 52.7.0-1.
# pacman -Syu "thunderbird>=52.7.0-1"
The problems have been fixed upstream in version 52.7.0.
References
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/ https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5125 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1416529%2C1434580%2C1434384%2C1437450%2C1437507%2C1426988%2C1438425%2C1324042%2C1437087%2C1443865%2C1425520 https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5127 https://bugzilla.mozilla.org/show_bug.cgi?id=1430557 https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5129 https://bugzilla.mozilla.org/show_bug.cgi?id=1428947 https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5144 https://bugzilla.mozilla.org/show_bug.cgi?id=1440926 https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5145 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1261175%2C1348955 https://github.com/xiph/vorbis/commit/667ceb4aab60c1f74060143bb24e5f427b3cce5f https://seclists.org/oss-sec/2018/q1/243 https://security.archlinux.org/CVE-2018-5125 https://security.archlinux.org/CVE-2018-5127 https://security.archlinux.org/CVE-2018-5129 https://security.archlinux.org/CVE-2018-5144 https://security.archlinux.org/CVE-2018-5145 https://security.archlinux.org/CVE-2018-5146
Workaround
None.