This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0240750638317335947== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="VCIMn8KiKcOa24N3HHC11EbqJT8Ra07f2"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --VCIMn8KiKcOa24N3HHC11EbqJT8Ra07f2 Content-Type: multipart/mixed; boundary="o5E2l2Flp7WJ5XxIIkQCLJOfak8tiG7gn"; protected-headers="v1" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <1d5f4931-b439-4936-b804-347f20ea523e@canonical.com> Subject: [USN-3278-1] Thunderbird vulnerabilities
--o5E2l2Flp7WJ5XxIIkQCLJOfak8tiG7gn Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3278-1 May 16, 2017
thunderbird vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04 - Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash, or execute arbitrary code. (CVE-2017-5429, CVE-2017-5430, CVE-2017-5436, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5461, CVE-2017-5467)
Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to spoof the addressbar contents, conduct cross-site scripting (XSS) attacks, cause a denial of service via application crash, or execute arbitrary code. (CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5469, CVE-2017-10195, CVE-2017-10196, CVE-2017-10197)
A flaw was discovered in the DRBG number generation in NSS. If an attacker were able to perform a man-in-the-middle attack, this flaw could potentially be exploited to view sensitive information. (CVE-2017-5462)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04: thunderbird 1:52.1.1+build1-0ubuntu0.17.04.1
Ubuntu 16.10: thunderbird 1:52.1.1+build1-0ubuntu0.16.10.1
Ubuntu 16.04 LTS: thunderbird 1:52.1.1+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: thunderbird 1:52.1.1+build1-0ubuntu0.14.04.1
After a standard system update you need to restart Thunderbird to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3278-1 CVE-2017-10195, CVE-2017-10196, CVE-2017-10197, CVE-2017-5429, CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5459, CVE-2017-5460, CVE-2017-5461, CVE-2017-5462, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467, CVE-2017-5469
Package Information: https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.17.04.1 https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.16.10.1 https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.14.04.1
--o5E2l2Flp7WJ5XxIIkQCLJOfak8tiG7gn--
--VCIMn8KiKcOa24N3HHC11EbqJT8Ra07f2 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJZG3+0AAoJEGEfvezVlG4PGEEH/0gCT+LMRjGkspWz9K6nfTr5 oSTowaJMDFtVOuuMwzk2+MhFsV6DovBT6eTfCUCV1dFntqOQddJnvE7nQohFA6Q9 FTTPMk0wlN60ObvQUti/aNWxkExelFUfAxxH45Cg9JND0MJYuYkR27hM2HXyX0Je rxWwQPxElqvKRxuDwwje0GdKTPChNgAGBs9KrkdlLkmnyXVisncXGoluqkYjPFac jgtFz5GhA7K/4xAUx0GQVEuFLHypYG12h6EPAvmrv3z25R7yRduRxIJAJUQumpE3 TOm4ZchRO9a5sMR7FSIQgV0CE2AltzBJRiIbH5xK9CEDBYF+8gCAhSFoBZFtFeY= =VDEA -----END PGP SIGNATURE-----
--VCIMn8KiKcOa24N3HHC11EbqJT8Ra07f2--
--===============0240750638317335947== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0240750638317335947==--
|