Updated thunderbird packages fix security vulnerabilities
Publication date: 15 Apr 2020Modification date: 15 Apr 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-6819 , CVE-2020-6820 , CVE-2020-6821 , CVE-2020-6822 , CVE-2020-6825
Description
The updated packages fix security vulnerabilities: Use-after-free while running the nsDocShell destructor. (CVE-2020-6819) Use-after-free when handling a ReadableStream. (CVE-2020-6820) Uninitialized memory could be read when using the WebGL copyTexSubImage method. (CVE-2020-6821) Out of bounds write in GMPDecodeData when processing large images. (CVE-2020-6822) Memory safety bugs fixed in Thunderbird 68.7.0. (CVE-2020-6825)
References
- https://bugs.mageia.org/show_bug.cgi?id=26455
- https://www.thunderbird.net/en-US/thunderbird/68.7.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-14/
- https://enigmail.net/index.php/en/download/changelog#enig2.1.6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825
SRPMS
7/core
- thunderbird-68.7.0-1.mga7
- thunderbird-l10n-68.7.0-1.mga7