MGASA-2019-0088

Source
https://advisories.mageia.org/MGASA-2019-0088.html
Import Source
https://advisories.mageia.org/MGASA-2019-0088.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0088
Related
Published
2019-02-17T17:17:45Z
Modified
2019-02-17T16:51:35Z
Summary
Updated thunderbird packages fix security vulnerability
Details

A use-after-free vulnerability in the Skia library can occur when creating a path, leading to a potentially exploitable crash. (CVE-2018-18356)

An integer overflow vulnerability in the Skia library can occur after specific transform operations, leading to a potentially exploitable crash. (CVE-2019-5785)

A buffer overflow vulnerability in the Skia library can occur with Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration in Firefox ESR. (CVE-2018-18335)

A flaw during verification of certain S/MIME signatures causes emails to be shown in Thunderbird as having a valid digital signature, even if the shown message contents aren't covered by the signature. The flaw allows an attacker to reuse a valid S/MIME signature to craft an email message with arbitrary content. (CVE-2018-18509)

References
Credits

Affected packages

Mageia:6 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
60.5.1-1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
60.5.1-1.mga6

Ecosystem specific

{
    "section": "core"
}