Bug 6390 - thunderbird needs to be updated to 10.0.5 for security issues
Summary: thunderbird needs to be updated to 10.0.5 for security issues
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard: mga1-64-OK, mga2-64-OK, mga1-32-OK, m...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2012-06-09 20:37 CEST by David Walser
Modified: 2012-06-19 21:04 CEST (History)
7 users (show)

See Also:
Source RPM: mozilla-thunderbird-10.0.4-1.mga1.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2012-06-09 20:37:48 CEST
Mandriva has issued an advisory today (June 9):
http://www.mandriva.com/en/support/security/advisories/?dis=2011&name=MDVSA-2012:088

This update is also needed for Mageia 2.

The build has already been submitted by Funda Wang.  The SRPMS are:
mozilla-thunderbird-10.0.5-1.mga1.src.rpm
thunderbird-10.0.5-1.mga2.src.rpm

We just need to get an advisory written.
David Walser 2012-06-09 20:37:58 CEST

CC: (none) => fundawang

Comment 1 Manuel Hiebel 2012-06-09 20:47:07 CEST
works fine for me since 2 days, the french langpack is ok (I don't use enigmail)

Whiteboard: (none) => mga1-64-OK,

Comment 2 David Walser 2012-06-09 20:48:49 CEST
I forgot the l10n SRPMS in my previous post.  The full list of SRPMS is:

mozilla-thunderbird-10.0.5-1.mga1.src.rpm
mozilla-thunderbird-l10n-10.0.5-1.mga1.src.rpm
thunderbird-10.0.5-1.mga2.src.rpm
thunderbird-l10n-10.0.5-1.mga2.src.rpm


Advisory:
========================

Updated mozilla-thunderbird packages fix security vulnerabilities:

Heap-based buffer overflow in the utf16_to_isolatin1 function in
Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5,
Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and
SeaMonkey before 2.10 allows remote attackers to execute arbitrary
code via vectors that trigger a character-set conversion failure
(CVE-2012-1947)

Use-after-free vulnerability in the nsFrameList::FirstChild function
in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5,
Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and
SeaMonkey before 2.10 allows remote attackers to execute arbitrary code
or cause a denial of service (heap memory corruption and application
crash) by changing the size of a container of absolutely positioned
elements in a column (CVE-2012-1940).

Heap-based buffer overflow in the
nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla
Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird
5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey
before 2.10 allows remote attackers to execute arbitrary code by
resizing a window displaying absolutely positioned and relatively
positioned elements in nested columns (CVE-2012-1941).

Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore
function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before
10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before
10.0.5, and SeaMonkey before 2.10 might allow remote attackers to
execute arbitrary code via document changes involving replacement or
insertion of a node (CVE-2012-1946).

Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5,
Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5,
and SeaMonkey before 2.10 allow local users to obtain sensitive
information via an HTML document that loads a shortcut (aka .lnk)
file for display within an IFRAME element, as demonstrated by a
network share implemented by (1) Microsoft Windows or (2) Samba
(CVE-2012-1945).

The Content Security Policy (CSP) implementation in Mozilla Firefox
4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0
through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey
before 2.10 does not block inline event handlers, which makes it
easier for remote attackers to conduct cross-site scripting (XSS)
attacks via a crafted HTML document (CVE-2012-1944).

Multiple unspecified vulnerabilities in the browser engine in Mozilla
Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before
2.10 allow remote attackers to cause a denial of service (memory
corruption and application crash) or possibly execute arbitrary
code via vectors related to (1) methodjit/ImmutableSync.cpp, (2)
the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp,
and unknown other components (CVE-2012-1938).

jsinfer.cpp in Mozilla Firefox ESR 10.x before 10.0.5 and Thunderbird
ESR 10.x before 10.0.5 does not properly determine data types,
which allows remote attackers to cause a denial of service (memory
corruption and application crash) or possibly execute arbitrary code
via crafted JavaScript code (CVE-2012-1939).

Multiple unspecified vulnerabilities in the browser engine in
Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5,
Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5,
and SeaMonkey before 2.10 allow remote attackers to cause a denial of
service (memory corruption and application crash) or possibly execute
arbitrary code via unknown vectors (CVE-2012-1937).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
http://www.mozilla.org/security/announce/2012/mfsa2012-34.html
http://www.mozilla.org/security/announce/2012/mfsa2012-36.html
http://www.mozilla.org/security/announce/2012/mfsa2012-37.html
http://www.mozilla.org/security/announce/2012/mfsa2012-38.html
http://www.mozilla.org/security/announce/2012/mfsa2012-40.html
Comment 3 José Jorge 2012-06-11 14:07:17 CEST
Ok here, on x86_64, french and lightning.

CC: (none) => lists.jjorge

Comment 4 claire robinson 2012-06-12 17:55:04 CEST
Note to our new QA testers - If you are testing this then please also test thunderbird-lightning and thunderbird-enigmail which are part of the same SRPM.
Comment 5 Juergen Harms 2012-06-12 22:23:21 CEST
Picking this up for QA testing on x86-64 and i586

CC: (none) => juergen.harms

Hans Micheelsen 2012-06-13 16:19:27 CEST

CC: (none) => micheelsen

Comment 6 Juergen Harms 2012-06-14 18:01:34 CEST
The references (plus googling) do not suffice for CVE-specific testing. 
Therefore testing against regressions using thunderbird in a production 
environment.

List of items verified
----------------------
Plain thunderbird
- GUI customisation
- Account creation
- Folder management (creation, deletion)
- Receiving (imap, pop) and sending messages (without pgp)
- Selecting & moving messages
- Creating, applying filters (including junk)
- Marking & tagging messages
- Compacting
- Searching
- Address book (importing, modifying, using)
- Spell checking (tried German and French)

Enigmail
- Setup wizard
- Sending messages with pgp

Lightning
- Event handling (creation, editing)
- Reminders
- Calendar creation
- Importing a calendar (.ics) exported from korganizer

Done so far on mga2-64: works fine, no regressions found.



Simplified advisory
-------------------
I tried to make the advisory shorter and easier to read - here is an
alternative suggestion, trying to focus on what a user might expect
(maybe still too extensive - I tried not to eliminate info from the 
original proposal).

Updated mozilla-thunderbird packages fix security vulnerabilities:

Issues addressed by these fixes are (in the order of the CVE 
references quoted below):
- multiple unspecified vulnerabilities in the browser engine allow remote 
  attackers to cause a denial of service (memory corruption and application 
  crash) or possibly execute arbitrary code via unknown vectors
- multiple unspecified vulnerabilities in the browser engine allow remote 
  attackers to cause a denial of service (memory corruption and application 
  crash) or possibly execute arbitrary code via vectors related to (1) 
  methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function 
  in js/src/jsarray.cpp, and unknown other components
- jsinfer.cpp does not properly determine data types, which allows remote 
  attackers to cause a denial of service (memory corruption and application 
  crash) or possibly execute arbitrary code via crafted JavaScript code
- use-after-free vulnerability: a remote attackers can execute arbitrary code
  or cause a denial of service by changing the size of a container of 
  absolutely positioned elements in a column (nsFrameList::FirstChild function)
- heap-based buffer overflow allows remote attackers to execute arbitrary code 
  or cause a denial of service (heap memory corruption and application crash) 
  by changing the size of a container of absolutely positioned elements in a 
  column (nsHTMLReflowState::CalculateHypotheticalBox function)
- failure by the Content Security Policy (CSP) implementation to block inline
  event handlers, which makes it easier for remote attackers to conduct 
  cross-site scripting (XSS) attacks via a crafted HTML document 
- obtaining sensitive information by a local user via an HTML document that
  loads a shortcut (aka .lnk) file for display within an IFRAME element
- use-after-free vulnerability might allow remote attackers to execute 
  arbitrary code via document changes involving replacement or insertion 
  of a node (nsINode::ReplaceOrInsertBefore function)
- heap-based buffer overflow allows remote attackers to execute arbitrary 
  code via vectors that trigger a character-set conversion failure
  (utf16_to_isolatin1 function)

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
http://www.mozilla.org/security/announce/2012/mfsa2012-34.html
http://www.mozilla.org/security/announce/2012/mfsa2012-36.html
http://www.mozilla.org/security/announce/2012/mfsa2012-37.html
http://www.mozilla.org/security/announce/2012/mfsa2012-38.html
http://www.mozilla.org/security/announce/2012/mfsa2012-40.html

Whiteboard: mga1-64-OK, => mga1-64-OK, mga2-64-OK

Comment 7 Dave Hodgins 2012-06-15 02:05:58 CEST
Testing complete in Mageia 1 i586 including enigmail and lightning.

I'll test Mageia 2 i586 shortly.

CC: (none) => davidwhodgins
Whiteboard: mga1-64-OK, mga2-64-OK => mga1-64-OK, mga2-64-OK, mga1-32-OK

Comment 8 Dave Hodgins 2012-06-15 02:40:44 CEST
Testing complete in Mageia 2 i586 including enigmail and lightning.

Found a problem with gpg-agent.  I've added a patch to bug 5360 to fix it.
Once that's fixed, thunderbird with enigmail is working.

Could someone from the sysadmin team push the srpms
thunderbird-10.0.5-1.mga2.src.rpm
thunderbird-l10n-10.0.5-1.mga2.src.rpm
from Mageia 1 Core Updates Testing to Core Updates and the srpms
thunderbird-l10n-10.0.5-1.mga2.src.rpm
thunderbird-10.0.5-1.mga2.src.rpm
from Mageia 2 Core Updates Testing to Core Updates.

Advisory: Updated mozilla-thunderbird packages fix security vulnerabilities:

Issues addressed by these fixes are (in the order of the CVE 
references quoted below):
- multiple unspecified vulnerabilities in the browser engine allow remote 
  attackers to cause a denial of service (memory corruption and application 
  crash) or possibly execute arbitrary code via unknown vectors
- multiple unspecified vulnerabilities in the browser engine allow remote 
  attackers to cause a denial of service (memory corruption and application 
  crash) or possibly execute arbitrary code via vectors related to (1) 
  methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function 
  in js/src/jsarray.cpp, and unknown other components
- jsinfer.cpp does not properly determine data types, which allows remote 
  attackers to cause a denial of service (memory corruption and application 
  crash) or possibly execute arbitrary code via crafted JavaScript code
- use-after-free vulnerability: a remote attackers can execute arbitrary code
  or cause a denial of service by changing the size of a container of 
  absolutely positioned elements in a column (nsFrameList::FirstChild function)
- heap-based buffer overflow allows remote attackers to execute arbitrary code 
  or cause a denial of service (heap memory corruption and application crash) 
  by changing the size of a container of absolutely positioned elements in a 
  column (nsHTMLReflowState::CalculateHypotheticalBox function)
- failure by the Content Security Policy (CSP) implementation to block inline
  event handlers, which makes it easier for remote attackers to conduct 
  cross-site scripting (XSS) attacks via a crafted HTML document 
- obtaining sensitive information by a local user via an HTML document that
  loads a shortcut (aka .lnk) file for display within an IFRAME element
- use-after-free vulnerability might allow remote attackers to execute 
  arbitrary code via document changes involving replacement or insertion 
  of a node (nsINode::ReplaceOrInsertBefore function)
- heap-based buffer overflow allows remote attackers to execute arbitrary 
  code via vectors that trigger a character-set conversion failure
  (utf16_to_isolatin1 function)

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
http://www.mozilla.org/security/announce/2012/mfsa2012-34.html
http://www.mozilla.org/security/announce/2012/mfsa2012-36.html
http://www.mozilla.org/security/announce/2012/mfsa2012-37.html
http://www.mozilla.org/security/announce/2012/mfsa2012-38.html
http://www.mozilla.org/security/announce/2012/mfsa2012-40.html

https://bugs.mageia.org/show_bug.cgi?id=6390

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs
Whiteboard: mga1-64-OK, mga2-64-OK, mga1-32-OK => mga1-64-OK, mga2-64-OK, mga1-32-OK, mga2-32-OK

Comment 9 David Walser 2012-06-15 03:15:26 CEST
Could we please use the original advisory posted in Comment 2?  It fits our standard format.
Comment 10 Dave Hodgins 2012-06-15 09:06:39 CEST
(In reply to comment #9)
> Could we please use the original advisory posted in Comment 2?  It fits our
> standard format.

Fine with me.
Comment 11 Thomas Backlund 2012-06-19 21:04:56 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0120

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.