安全公告详情

NS-SA-2019-0190

2019-10-14 19:29:28

简介

important: dhcp/thunderbird security update

严重级别

important

主题

An update for dhcp/thunderbird is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

dhcp: DHCP (Dynamic Host Configuration Protocol) is a protocol which allows individual devices on an IP network to get their own network configuration information (IP address, subnetmask, broadcast address, etc.) from a DHCP server. The overall purpose of DHCP is to make it easier to administer a large network. To use DHCP on your network, install a DHCP service (or relay agent), and on clients run a DHCP client daemon. The dhclient package provides the ISC DHCP client daemon.
thunderbird: Mozilla Thunderbird is a standalone mail and newsgroup client.


Security Fix(es):
dhcp: ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2019-6470)
dhcp: bugfix
thunderbird: crypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 68.1 and Thunderbird < 60.9.(CVE-2019-11739)
thunderbird: Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.(CVE-2019-11740)
thunderbird: A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.(CVE-2019-11742)
thunderbird: Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.(CVE-2019-11743)
thunderbird: Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.(CVE-2019-11744)
thunderbird: A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.(CVE-2019-11746)
thunderbird: It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.(CVE-2019-11752)
thunderbird: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F18.

影响组件

  • dhcp
  • thunderbird

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["dhclient-4.2.5-77.el7.centos.x86_64.rpm","dhcp-4.2.5-77.el7.centos.x86_64.rpm","dhcp-common-4.2.5-77.el7.centos.x86_64.rpm","dhcp-debuginfo-4.2.5-77.el7.centos.x86_64.rpm","dhcp-devel-4.2.5-77.el7.centos.x86_64.rpm","dhcp-libs-4.2.5-77.el7.centos.x86_64.rpm"],"source":"dhcp-4.2.5-77.el7.centos.src.rpm"},{"binary":["thunderbird-60.9.0-1.el7.centos.x86_64.rpm","thunderbird-debuginfo-60.9.0-1.el7.centos.x86_64.rpm"],"source":"thunderbird-60.9.0-1.el7.centos.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["dhclient-4.2.5-77.el7.centos.x86_64.rpm","dhcp-4.2.5-77.el7.centos.x86_64.rpm","dhcp-common-4.2.5-77.el7.centos.x86_64.rpm","dhcp-debuginfo-4.2.5-77.el7.centos.x86_64.rpm","dhcp-devel-4.2.5-77.el7.centos.x86_64.rpm","dhcp-libs-4.2.5-77.el7.centos.x86_64.rpm"],"source":"dhcp-4.2.5-77.el7.centos.src.rpm"},{"binary":["thunderbird-60.9.0-1.el7.centos.x86_64.rpm","thunderbird-debuginfo-60.9.0-1.el7.centos.x86_64.rpm"],"source":"thunderbird-60.9.0-1.el7.centos.src.rpm"}]}]}

CVE

参考