./mail/thunderbird, Organize, secure and customize your mail

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 52.4.0, Package name: thunderbird-52.4.0, Maintainer: pkgsrc-users

Mozilla Thunderbird is a redesign of the Mozilla mail component. The
goal is to produce a cross platform stand alone mail application using
the XUL user interface language. This version uses the gtk2 toolkit.


Required to run:
[sysutils/desktop-file-utils] [textproc/icu] [graphics/MesaLib] [graphics/cairo] [graphics/jpeg] [net/libIDL] [devel/nspr] [devel/libffi] [devel/nss] [x11/gtk2] [textproc/hunspell] [x11/pixman] [multimedia/libvpx] [x11/gtk3] [multimedia/ffmpeg3]

Required to build:
[pkgtools/x11-links] [devel/yasm] [x11/compositeproto] [x11/glproto] [x11/renderproto] [x11/xproto] [x11/xf86vidmodeproto] [x11/recordproto] [x11/xf86driproto] [x11/damageproto] [x11/inputproto] [x11/xextproto] [x11/randrproto] [x11/dri2proto] [x11/xcb-proto] [x11/fixesproto4] [pkgtools/cwrappers]

Package options: gtk3, mozilla-lightning, pulseaudio

Master sites: (Expand)

SHA1: a51299181996abb6b861a7a5e41a770ef357ceb4
RMD160: 09e960c97f13eaf0818cfce0b573ef94f371ad92
Filesize: 223204.789 KB

Version history: (Expand)


CVS history: (Expand)


   2017-11-17 01:49:20 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 52.4.0

Chagelog:
New
In Thunderbird 52 a new behavior was introduced for replies to mailing
list posts: "When replying to a mailing list, reply will be sent to
address in From header ignoring Reply-to header". A new preference
mail.override_list_reply_to allows to restore the previous behavior.

Fixed
Under certain circumstances (image attachment and non-image attachment),
attached images were shown truncated in messages stored in IMAP
folders not synchronised for offline use.

Fixed
IMAP UIDs > 0x7FFFFFFF not handled properly

Security fixes:
#CVE-2017-7793: Use-after-free with Fetch API

Reporter
    Abhishek Arya
Impact
    high

Description

A use-after-free vulnerability can occur in the Fetch API when the
worker or the associated window are freed when still in use,
resulting in a potentially exploitable crash.

References
    Bug 1371889

#CVE-2017-7818: Use-after-free during ARIA array manipulation

Reporter
    Nils
Impact
    high

Description

A use-after-free vulnerability can occur when manipulating arrays of
Accessible Rich Internet Applications (ARIA) elements within containers
through the DOM. This results in a potentially exploitable crash.

References
    Bug 1363723

#CVE-2017-7819: Use-after-free while resizing images in design mode

Reporter
    Nils
Impact
    high

Description

A use-after-free vulnerability can occur in design mode when image
objects are resized if objects referenced during the resizing have
been freed from memory. This results in a potentially exploitable crash.

References
    Bug 1380292

#CVE-2017-7824: Buffer overflow when drawing and validating elements
with ANGLE

Reporter
    Omair, Andre Weissflog
Impact
    high

Description

A buffer overflow occurs when drawing and validating elements with
the ANGLE graphics library, used for WebGL content. This is due to
an incorrect value being passed within the library during checks and
results in a potentially exploitable crash.

References
    Bug 1398381

#CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes

Reporter
    Martin Thomson
Impact
    high

Description

During TLS 1.2 exchanges, handshake hashes are generated which point
to a message buffer. This saved data is used for later messages but
in some cases, the handshake transcript can exceed the space available
in the current buffer, causing the allocation of a new buffer. This
leaves a pointer pointing to the old, freed buffer, resulting in
a use-after-free when handshake hashes are then calculated afterwards.
This can result in a potentially exploitable crash.

References
    Bug 1377618

#CVE-2017-7814: Blob and data URLs bypass phishing and malware
protection warnings

Reporter
    Fran├žois Marier
Impact
    moderate

Description

File downloads encoded with blob: and data: URL elements bypassed
normal file download checks though the Phishing and Malware Protection
feature and its block lists of suspicious sites and files. This
would allow malicious sites to lure users into downloading executables
that would otherwise be detected as suspicious.

References
    Bug 1376036

#CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode
characters as spaces

Reporter
    Khalil Zhani
Impact
    moderate

Description

Several fonts on OS X display some Tibetan and Arabic characters
as whitespace. When used in the addressbar as part of an IDN
this can be used for domain name spoofing attacks.
Note: This attack only affects OS X operating systems. Other
operating systems are unaffected.

References
    Bug 1393624
    Bug 1390980

#CVE-2017-7823: CSP sandbox directive did not create a unique origin

Reporter
    Jun Kokatsu
Impact
    moderate

Description

The content security policy (CSP) sandbox directive did not
create a unique origin for the document, causing it to behave as
if the allow-same-origin keyword were always specified. This could
allow a Cross-Site Scripting (XSS) attack to be launched from
unsafe content.

References
    Bug 1396320

#CVE-2017-7810: Memory safety bugs fixed in Firefox 56, Firefox ESR 52.4,
and Thunderbird 52.4

Reporter
    Mozilla developers and community
Impact
    critical

Description

Mozilla developers and community members Christoph Diehl, Jan de Mooij,
Jason Kratzer, Randell Jesup, Tom Ritter, Tyson Smith, and Sebastian
Hengst reported memory safety bugs present in Firefox 55, Firefox
ESR 52.3, and Thunderbird 52.3. Some of these bugs showed evidence
of memory corruption and we presume that with enough effort that some
of these could be exploited to run arbitrary code.

References
    Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
   2017-10-27 20:01:44 by Ryo ONODERA | Files touched by this commit (2)
Log message:
Remove removed inclusion. Pointed by oster@. Thank you
   2017-09-18 11:53:40 by Maya Rashish | Files touched by this commit (676)
Log message:
revbump for requiring ICU 59.x
   2017-09-08 04:38:46 by Ryo ONODERA | Files touched by this commit (132)
Log message:
Recursive revbump from audio/pulseaudio-11.0
   2017-09-06 11:03:07 by Thomas Klausner | Files touched by this commit (86)
Log message:
Follow some redirects.
   2017-08-19 06:19:03 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 52.3.0

Changelog:
    Fixed
    Unwanted inline images shown in rogue SPAM messages

    Fixed
    Deleting message from the POP3 server not working when maildir storage was used

    Fixed
    Message disposition flag (replied / forwarded) lost when reply or forwarded \ 
message was stored as draft and draft was sent later

    Fixed
    Inline images not scaled to fit when printing

    Fixed
    Selected text from another message sometimes included in a reply

    Fixed
    No authorisation prompt displayed when inserting image into email body \ 
although image URL requires authentication

    Fixed
    Large attachments taking a long time to open under some circumstances

    Fixed
    Various security fixes
   2017-07-03 18:37:52 by Ryo ONODERA | Files touched by this commit (4) | Package updated
Log message:
Update to 52.2.1

Changelog:
52.2.1
    Fixed Problems with Gmail (folders not showing, repeated email download, \ 
etc.) introduced in version 52.2.0.

52.2.0
    Fixed Embedded images not shown in email received from Hotmail/Outlook webmailer
    Fixed Detection of non-ASCII font names in font selector
    Fixed Attachment not forwarded correctly under certain circumstances
    Fixed Multiple requests for master password when GMail OAuth2 is enabled
    Fixed Large number of blank pages being printed under certain circumstances \ 
when invalid preferences were present
    Fixed Messages sent via the Simple MAPI interface are forced to HTML
    Fixed Calendar: Invitations can't be printed
    Fixed Mailing list (group) not accessible from macOS or Outlook address book
    Fixed Clicking on links with references/anchors where target doesn't exist \ 
in the message not opening in external browser
    Fixed Various security fixes

#CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
#CVE-2017-7749: Use-after-free during docshell reloading
#CVE-2017-7750: Use-after-free with track elements
#CVE-2017-7751: Use-after-free with content viewer listeners
#CVE-2017-7752: Use-after-free with IME input
#CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
#CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
#CVE-2017-7757: Use-after-free in IndexedDB
#CVE-2017-7758: Out-of-bounds read in Opus encoder
#CVE-2017-7763: Mac fonts render some unicode characters as spaces
#CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other \ 
unicode blocks
#CVE-2017-7765: Mark of the Web bypass when saving executable files
#CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2, and \ 
Thunderbird 52.2

52.1.1
    Fixed Large attachments may not be shown or saved correctly if the message \ 
is stored in an IMAP folder which is not synchronized for offline use
    Fixed Unable to load full message via POP if message was downloaded \ 
partially (or only headers) before
    Fixed Some attachments can't be opened or saved if the message body is empty
    Fixed Crash when compacting IMAP folder
   2017-05-01 07:50:09 by Ryo ONODERA | Files touched by this commit (3) | Package updated
Log message:
Update to 52.1.0

Changelog:
Fixed
* Background images not working and other issues related to embedded images when \ 
composing email
* Google Oauth setup can sometimes not progress to the next step