Mageia 2020-0170: thunderbird security update
The updated packages fix security vulnerabilities: Use-after-free while running the nsDocShell destructor
Summary
The updated packages fix security vulnerabilities:
Use-after-free while running the nsDocShell destructor. (CVE-2020-6819)
Use-after-free when handling a ReadableStream. (CVE-2020-6820)
Uninitialized memory could be read when using the WebGL copyTexSubImage
method. (CVE-2020-6821)
Out of bounds write in GMPDecodeData when processing large images.
(CVE-2020-6822)
Memory safety bugs fixed in Thunderbird 68.7.0. (CVE-2020-6825)
References
- https://bugs.mageia.org/show_bug.cgi?id=26455
- https://www.thunderbird.net/en-US/thunderbird/68.7.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-14/
- https://enigmail.net/index.php/en/download/changelog#enig2.1.6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825
Resolution
MGASA-2020-0170 - Updated thunderbird packages fix security vulnerabilities
SRPMS
- 7/core/thunderbird-68.7.0-1.mga7
- 7/core/thunderbird-l10n-68.7.0-1.mga7