Mozilla has released Thunderbird 68.5.0 on February 11:
It fixes several security issues:
Updated packages uploaded by Nicolas. Advisory to come.
Updated packages in core/updates_testing:
MGA7-64 Plasma on Lenovo B50
No installation issues
Sent and received messages without and with attachments between different -mail accounts and machines. All OK.
On mga7-64 kernel-desktop plasma
packages installed cleanly:
email (POP, SMTP): OK
Address book: OK
I don't use enigmail or IMAP
looks OK for mga7-64
i5-2500, wired Internet, 64-bit Plasma system.
No installation problems. Looks like it's working OK here.
64 bit OK for offline imap + smtp
Have been using it two days 20+ mails under:
Current kernel-desktop + nvidia-current + plasma, swedish locale
Took over mail end settings OK.
Was updated together with firefox in testing.
Not tested calendar etc, only using mail, settings i already had.
Still working here, days later. Time to let it go.
Validating. Advisory in Comment 1.
Updated thunderbird packages fix security vulnerabilities:
When deriving an identifier for an email message, uninitialized memory was used
in addition to the message contents (CVE-2020-6792).
When processing an email message with an ill-formed envelope, Thunderbird could
read data from a random memory location (CVE-2020-6793).
If a user saved passwords before Thunderbird 60 and then later set a master
password, an unencrypted copy of these passwords is still accessible. This is
because the older stored password file was not deleted when the data was
copied to a new format starting in Thunderbird 60. The new master password is
added only on the new file. This could allow the exposure of stored password
data outside of user expectations (CVE-2020-6794).
When processing a message that contains multiple S/MIME signatures, a bug in
the MIME processing code caused a null pointer dereference, leading to an
unexploitable crash (CVE-2020-6795).
If a <template> tag was used in a <select> tag, the parser could be confused
site that relied on the browser behaving correctly could suffer a cross-site
scripting vulnerability as a result (CVE-2020-6798).
Memory safety bugs present in Thunderbird ESR 68.4. Some of these bugs showed
evidence of memory corruption and presumably some of these could have been
exploited to run arbitrary code (CVE-2020-6800).
An update for this issue has been pushed to the Mageia Updates repository.
RedHat has issued an advisory for this today (February 24):