Summary: | <www-client/{firefox,thunderbird}{,-bin}-68.3.0: multiple vulnerabilities (MFSA-2019-{37,38}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | mozilla |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/ | ||
Whiteboard: | A2 [glsa+ cve] | ||
Package list: |
www-client/firefox-68.3.0
mail-client/thunderbird-68.3.0 amd64 x86
|
Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2019-12-13 01:20:32 UTC
CVE-2019-17008: Use-after-free in worker destruction Impact high Description When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. References CVE-2019-17010: Use-after-free when performing device orientation checks Impact moderate Description Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. CVE-2019-17005: Buffer overflow in plain text serializer Impact moderate Description The plain text serializer used a fixed-size array for the number of elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. CVE-2019-17011: Use-after-free when retrieving a document in antitracking Impact moderate Description Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 Impact high Description Memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. Adding mail-client/thunderbird which is sharing all CVEs. amd64 stable x86 stable The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=16f135f15a3c7a0bd717e145fc59f19d0541660b commit 16f135f15a3c7a0bd717e145fc59f19d0541660b Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2019-12-22 22:06:45 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2019-12-22 22:07:17 +0000 mail-client/thunderbird-bin: security cleanup Bug: https://bugs.gentoo.org/702638 Package-Manager: Portage-2.3.82, Repoman-2.3.20 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> mail-client/thunderbird-bin/Manifest | 55 ------- .../thunderbird-bin/thunderbird-bin-68.2.2.ebuild | 182 --------------------- 2 files changed, 237 deletions(-) https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=daebd5310d5939867d0a1457c9253850ceb14631 commit daebd5310d5939867d0a1457c9253850ceb14631 Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2019-12-22 22:03:33 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2019-12-22 22:07:15 +0000 mail-client/thunderbird: security cleanup Bug: https://bugs.gentoo.org/702638 Package-Manager: Portage-2.3.82, Repoman-2.3.20 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> mail-client/thunderbird/Manifest | 108 --- mail-client/thunderbird/thunderbird-68.2.2.ebuild | 778 --------------------- mail-client/thunderbird/thunderbird-68.3.0.ebuild | 779 ---------------------- 3 files changed, 1665 deletions(-) arm64 stable Added to an existing GLSA. This issue was resolved and addressed in GLSA 202003-02 at https://security.gentoo.org/glsa/202003-02 by GLSA coordinator Thomas Deutschmann (whissi). Re-opening for Thunderbird. This issue was resolved and addressed in GLSA 202003-10 at https://security.gentoo.org/glsa/202003-10 by GLSA coordinator Thomas Deutschmann (whissi). |