Mageia 2019-0088: thunderbird security update
Summary
A use-after-free vulnerability in the Skia library can occur when creating
a path, leading to a potentially exploitable crash. (CVE-2018-18356)
An integer overflow vulnerability in the Skia library can occur after
specific transform operations, leading to a potentially exploitable crash.
(CVE-2019-5785)
A buffer overflow vulnerability in the Skia library can occur with Canvas
2D acceleration on macOS. This issue was addressed by disabling Canvas 2D
acceleration in Firefox ESR. (CVE-2018-18335)
A flaw during verification of certain S/MIME signatures causes emails to
be shown in Thunderbird as having a valid digital signature, even if the
shown message contents aren't covered by the signature. The flaw allows an
attacker to reuse a valid S/MIME signature to craft an email message with
arbitrary content. (CVE-2018-18509)
References
- https://bugs.mageia.org/show_bug.cgi?id=24360
- https://www.thunderbird.net/en-US/thunderbird/60.5.1/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18509
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785
Resolution
MGASA-2019-0088 - Updated thunderbird packages fix security vulnerability
SRPMS
- 6/core/thunderbird-60.5.1-1.mga6
- 6/core/thunderbird-l10n-60.5.1-1.mga6