thunderbird-68.4.1-2.AXS4

エラータID: AXSA:2020-4431:01

Release date: 
Tuesday, January 21, 2020 - 03:53
Subject: 
thunderbird-68.4.1-2.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.4.1.

Security Fix(es):

* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026)

* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016)

* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017)

* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024)

* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2019-17016
When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
CVE-2019-17017
Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
CVE-2019-17022
When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
CVE-2019-17024
Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
CVE-2019-17026
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. thunderbird-68.4.1-2.AXS4.src.rpm
    MD5: ce21b29ababc1f23d2a902d8a2f775fa
    SHA-256: 4c60ba6a7b0adb36a06b737656a922764e77a7561c2eb73ced1220f9cfb0e11f
    Size: 516.87 MB

Asianux Server 4 for x86
  1. thunderbird-68.4.1-2.AXS4.i686.rpm
    MD5: efd59a256b5cac908ac87ae948ea3b06
    SHA-256: 87c27606f2787ac6591c028ab8a633f5ea0a6f2329244501d701c642cdd88e76
    Size: 109.43 MB

Asianux Server 4 for x86_64
  1. thunderbird-68.4.1-2.AXS4.x86_64.rpm
    MD5: 5282a361c4ae44fe34e4c0ed38d42dd1
    SHA-256: 8a7f391d0b5d92258eb5c94d657eaf61ec6cd5c161cd1377990342bb70a1c6f5
    Size: 109.15 MB