A flaw was found in Mozilla Thunderbird. A Heap-based buffer over read in parser_get_next_char function in icalparser.c might lead to application crash. Upstream bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1553820
Is this for Thunderbird only, or the libical package is also affected? I would verify that myself, but I do not have access to any related bug report mentioned here, neither to the upstream Mozilla bug.
External References: https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/
Mitigation: Thunderbird can be configured to use icaljs instead of libical by setting `calendar.icaljs = true` in preferences, mitigating this vulnerability.
Created thunderbird tracking bugs for this issue: Affects: fedora-all [bug 1720422]
References: https://www.openwall.com/lists/oss-security/2019/06/13/2
This function reads from a string provided by its caller. Prior to upstream commit 9a6b85328 (pre v2.0.0, 2015-08-11), the way it handled quotes made it possible to read out of bounds of the string provided. No pointer-based writes are possible.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1623 https://access.redhat.com/errata/RHSA-2019:1623
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1624 https://access.redhat.com/errata/RHSA-2019:1624
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1626 https://access.redhat.com/errata/RHSA-2019:1626