Skip to navigation

Security Advisory Moderate: thunderbird security update

Advisory: RHSA-2010:0969-2
Type: Security Advisory
Severity: Moderate
Issued on: 2010-12-09
Last updated on: 2010-12-09
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.0.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2010-3768
CVE-2010-3776
CVE-2010-3777

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML content.
Malicious HTML content could cause Thunderbird to crash or, potentially,
execute arbitrary code with the privileges of the user running Thunderbird.
(CVE-2010-3776, CVE-2010-3777)

Note: JavaScript support is disabled in Thunderbird for mail messages. The
above issues are believed to not be exploitable without JavaScript.

This update adds support for the Sanitiser for OpenType (OTS) library to
Thunderbird. This library helps prevent potential exploits in malformed OpenType
fonts by verifying the font file prior to use. (CVE-2010-3768)

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
thunderbird-3.1.7-3.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: a1082de5648741d52bc5fb3d4929ba39
SHA-256: 2c32fc604739f5c49da3b397b3073fe1323cad1dd1b93b394906c982ed0194f9
 
IA-32:
thunderbird-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2137b157a6ec0b5e129fe3f40237c9ab
SHA-256: 8233683369601323a599d77d6ed60fff1c5fc935a6f2bec7d2d243517a104ceb
thunderbird-debuginfo-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: a4b0f1b2ebfd08936773f3b523b2ec38
SHA-256: 0569682ccccf28646096a99203d810ddf0f07d498ca66bedc1cfaf4a07022c78
 
x86_64:
thunderbird-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 3bf686e3df4e551dd3f93531215dd22b
SHA-256: 44acf5fff8eec9f60e5b3f64887e334cd673dd1fa5ac283cdfcb427970bfe1b9
thunderbird-debuginfo-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6ec596b1aa1593db8fecffffbe417561
SHA-256: a2bc115d679642897dafbd3521d2d4fd269934db9ac913246b850e651b55b620
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
thunderbird-3.1.7-3.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: a1082de5648741d52bc5fb3d4929ba39
SHA-256: 2c32fc604739f5c49da3b397b3073fe1323cad1dd1b93b394906c982ed0194f9
 
IA-32:
thunderbird-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2137b157a6ec0b5e129fe3f40237c9ab
SHA-256: 8233683369601323a599d77d6ed60fff1c5fc935a6f2bec7d2d243517a104ceb
thunderbird-debuginfo-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: a4b0f1b2ebfd08936773f3b523b2ec38
SHA-256: 0569682ccccf28646096a99203d810ddf0f07d498ca66bedc1cfaf4a07022c78
 
PPC:
thunderbird-3.1.7-3.el6_0.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: bc4bdb062b689bac805623f5b6e9a91d
SHA-256: b4ece7d36970a3d1e34573ab2c79eb8271c35499017d39820dd96e7f7d40e8c2
thunderbird-debuginfo-3.1.7-3.el6_0.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 288ddbacc7562695baa98ae99ea74abd
SHA-256: daf28e8d3a9f784d194b722a2eb69cafa17c7127614d1a1be61eb27135e3a0ff
 
s390x:
thunderbird-3.1.7-3.el6_0.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: c62af697c32e9ce101602fc7fe0b810e
SHA-256: 20cb2e58345b4d31c3469789d44a0a923dc4fcf23732401b5b57851ae2e1da80
thunderbird-debuginfo-3.1.7-3.el6_0.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: 13ba07cd190009e0673510f508aea984
SHA-256: 6828ce7d6f1390c752f628e1aafe0cb0472dddff6543cfd4d4c9cb9fce6e1070
 
x86_64:
thunderbird-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 3bf686e3df4e551dd3f93531215dd22b
SHA-256: 44acf5fff8eec9f60e5b3f64887e334cd673dd1fa5ac283cdfcb427970bfe1b9
thunderbird-debuginfo-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6ec596b1aa1593db8fecffffbe417561
SHA-256: a2bc115d679642897dafbd3521d2d4fd269934db9ac913246b850e651b55b620
 
Red Hat Enterprise Linux Server EUS (v. 6.0.z)

SRPMS:
thunderbird-3.1.7-3.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: a1082de5648741d52bc5fb3d4929ba39
SHA-256: 2c32fc604739f5c49da3b397b3073fe1323cad1dd1b93b394906c982ed0194f9
 
IA-32:
thunderbird-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2011:0475
    MD5: 2137b157a6ec0b5e129fe3f40237c9ab
SHA-256: 8233683369601323a599d77d6ed60fff1c5fc935a6f2bec7d2d243517a104ceb
thunderbird-debuginfo-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2011:0475
    MD5: a4b0f1b2ebfd08936773f3b523b2ec38
SHA-256: 0569682ccccf28646096a99203d810ddf0f07d498ca66bedc1cfaf4a07022c78
 
PPC:
thunderbird-3.1.7-3.el6_0.ppc64.rpm
File outdated by:  RHSA-2011:0475
    MD5: bc4bdb062b689bac805623f5b6e9a91d
SHA-256: b4ece7d36970a3d1e34573ab2c79eb8271c35499017d39820dd96e7f7d40e8c2
thunderbird-debuginfo-3.1.7-3.el6_0.ppc64.rpm
File outdated by:  RHSA-2011:0475
    MD5: 288ddbacc7562695baa98ae99ea74abd
SHA-256: daf28e8d3a9f784d194b722a2eb69cafa17c7127614d1a1be61eb27135e3a0ff
 
s390x:
thunderbird-3.1.7-3.el6_0.s390x.rpm
File outdated by:  RHSA-2011:0475
    MD5: c62af697c32e9ce101602fc7fe0b810e
SHA-256: 20cb2e58345b4d31c3469789d44a0a923dc4fcf23732401b5b57851ae2e1da80
thunderbird-debuginfo-3.1.7-3.el6_0.s390x.rpm
File outdated by:  RHSA-2011:0475
    MD5: 13ba07cd190009e0673510f508aea984
SHA-256: 6828ce7d6f1390c752f628e1aafe0cb0472dddff6543cfd4d4c9cb9fce6e1070
 
x86_64:
thunderbird-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2011:0475
    MD5: 3bf686e3df4e551dd3f93531215dd22b
SHA-256: 44acf5fff8eec9f60e5b3f64887e334cd673dd1fa5ac283cdfcb427970bfe1b9
thunderbird-debuginfo-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2011:0475
    MD5: 6ec596b1aa1593db8fecffffbe417561
SHA-256: a2bc115d679642897dafbd3521d2d4fd269934db9ac913246b850e651b55b620
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
thunderbird-3.1.7-3.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: a1082de5648741d52bc5fb3d4929ba39
SHA-256: 2c32fc604739f5c49da3b397b3073fe1323cad1dd1b93b394906c982ed0194f9
 
IA-32:
thunderbird-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2137b157a6ec0b5e129fe3f40237c9ab
SHA-256: 8233683369601323a599d77d6ed60fff1c5fc935a6f2bec7d2d243517a104ceb
thunderbird-debuginfo-3.1.7-3.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: a4b0f1b2ebfd08936773f3b523b2ec38
SHA-256: 0569682ccccf28646096a99203d810ddf0f07d498ca66bedc1cfaf4a07022c78
 
x86_64:
thunderbird-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 3bf686e3df4e551dd3f93531215dd22b
SHA-256: 44acf5fff8eec9f60e5b3f64887e334cd673dd1fa5ac283cdfcb427970bfe1b9
thunderbird-debuginfo-3.1.7-3.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6ec596b1aa1593db8fecffffbe417561
SHA-256: a2bc115d679642897dafbd3521d2d4fd269934db9ac913246b850e651b55b620
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

660408 - CVE-2010-3776 Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
660415 - CVE-2010-3777 Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
660420 - CVE-2010-3768 Mozilla add support for OTS font sanitizer (MFSA 2010-78)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/