Mageia 2021-0427: thunderbird security update
Summary
Mozilla developers Tyson Smith and Gabriele Svelto reported memory safety
bugs present in Thunderbird ESR 78.13. Some of these bugs showed evidence
of memory corruption and we presume that with enough effort some of these
could have been exploited to run arbitrary code (CVE-2021-38493).
The thunderbird package has been updated to the 91 branch. See the
upstream release notes for details.
References
- https://bugs.mageia.org/show_bug.cgi?id=29378
- https://www.mozilla.org/en-US/security/advisories/mfsa2021-42/
- https://www.thunderbird.net/en-US/thunderbird/91.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.0.1/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.0.2/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.0.3/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.1.0/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/91.1.1/releasenotes/
- https://access.redhat.com/errata/RHSA-2021:3494
- https://bugs.mageia.org/show_bug.cgi?id=29471
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493
Resolution
MGASA-2021-0427 - Updated thunderbird packages fix security vulnerability
SRPMS
- 8/core/thunderbird-91.1.1-1.mga8
- 8/core/thunderbird-l10n-91.1.1-1.mga8