CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
A buffer overflow can occur when manipulating the SVG animatedPathSegList through script. This results in a potentially exploitable crash.
CVE-2018-5129: Out-of-bounds write with malformed IPC messages
A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process.
CVE-2018-5144: Integer overflow during Unicode conversion
An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter.
CVE-2018-5146: Out of bounds memory write in libvorbis
An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest.
CVE-2018-5125: Memory safety bugs fixed in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7
Mozilla developers and community members Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, and Philipp reported memory safety bugs present in Firefox 58, Firefox ESR 52.6, and Thunderbird 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7 and Thunderbird 52.7
Mozilla developers Jet Villegas and Randell Jesup reported memory safety bugs present in Firefox ESR 52.6 and Thunderbird 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
The bug has been referenced in the following commit(s):
Author: Aaron Bauman <email@example.com>
AuthorDate: 2018-03-29 21:31:16 +0000
Commit: Aaron Bauman <firstname.lastname@example.org>
CommitDate: 2018-03-29 21:31:16 +0000
mail-client/thunderbird: amd64 stable
Package-Manager: Portage-2.3.26, Repoman-2.3.7
mail-client/thunderbird/thunderbird-52.7.0.ebuild | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)}
An automated check of this bug failed - the following atom is unknown:
Please verify the atom list.
ppc/ppc64 stable. all arches stable
Added to an existing GLSA request.
This issue was resolved and addressed in
GLSA 201811-13 at https://security.gentoo.org/glsa/201811-13
by GLSA coordinator Aaron Bauman (b-man).