Opened 5 years ago

Closed 5 years ago

Last modified 5 years ago

#12573 closed enhancement (fixed)

thunderbird-68.1.1

Reported by: Bruce Dubbs Owned by: Tim Tassonis
Priority: high Milestone: 9.1
Component: BOOK Version: SVN
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (3)

comment:1 by Tim Tassonis, 5 years ago

Owner: changed from blfs-book to Tim Tassonis
Status: newassigned

What’s New

fixed

Issues with attachments in IMAP messages fixed

Gmail accounts ignored a non-standard trash folder selection. Note: If non-standard trash folder was selected previously in the account settings, this setting will now take effect which may be unexpected. fixed

Entering/pasting lists of recipients into the addressing widget or mailing list not working reliably, especially when lists contained multiple commas or semicolons fixed

Edit mailing list not working fixed

Various theme fixes, especially dark theme improvements for Calendar fixed

Contrast between tag label and background not optimal fixed

Account Central pane always loaded at start-up fixed

"Config Editor" button not removed if blocked by policy fixed

Calendar: Free/busy information in attendees dialog not scrolled correctly. Note: Scroll arrows still not behaving correctly. fixed

Various security fixes

comment:2 by Tim Tassonis, 5 years ago

Resolution: fixed
Status: assignedclosed

Fixed in revision 22202.

comment:3 by Douglas R. Reno, 5 years ago

Priority: normalhigh
Mozilla Foundation Security Advisory 2019-30
Security vulnerabilities fixed in - Thunderbird 68.1

Announced
    September 11, 2019
Impact
    high
Products
    Thunderbird
Fixed in

        Thunderbird 68.1

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
#CVE-2019-11739: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message

Reporter
    Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk
Impact
    high

Description

Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward.
References

    Bug 1571481

#CVE-2019-11746: Use-after-free while manipulating video

Reporter
    Nils
Impact
    high

Description

A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash.
References

    Bug 1564449

#CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML

Reporter
    Rakesh Mane
Impact
    high

Description

Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements.
References

    Bug 1562033

#CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images

Reporter
    Paul Stone
Impact
    high

Description

A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft.
References

    Bug 1559715

#CVE-2019-11752: Use-after-free while extracting a key value in IndexedDB

Reporter
    Zhanjia Song
Impact
    high

Description

It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash.
References

    Bug 1501152

#CVE-2019-11743: Cross-origin access to unload event attributes

Reporter
    Yoav Weiss
Impact
    moderate

Description

Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks.
References

    Bug 1560495
    Navigation-Timing Level 2 specification

#CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9

Reporter
    Mozilla developers and community
Impact
    high

Description

Mozilla developers and community members Tyson Smith and Nathan Froyd reported memory safety bugs present in Firefox 68, Firefox ESR 68, Firefox 60.8, Thunderbird 68, and Thunderbird 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9


Note: See TracTickets for help on using tickets.