{
  "schema_version": "1.6.2",
  "id": "MGASA-2020-0209",
  "published": "2020-05-08T10:57:54Z",
  "modified": "2020-05-08T10:24:31Z",
  "summary": "Updated thunderbird packages fix security vulnerabilities",
  "details": "Updated thunderbird packages fix security vulnerabilities:\n\nA buffer overflow could occur when parsing and validating SCTP chunks\nin WebRTC. This could have led to memory corruption and a potentially\nexploitable crash (CVE-2020-6831).\n\nA race condition when running shutdown code for Web Worker led to a\nuse-after-free vulnerability. This resulted in a potentially exploitable\ncrash (CVE-2020-12387).\n\nThe 'Copy as cURL' feature of Devtools' network tab did not properly escape\nthe HTTP POST data of a request, which can be controlled by the website.\nIf a user used the 'Copy as cURL' feature and pasted the command into a\nterminal, it could have resulted in the disclosure of local files\n(CVE-2020-12392).\n\nMozilla developers and community members Alexandru Michis, Jason Kratzer,\nphilipp, Ted Campbell, Bas Schouten, André Bargull, and Karl Tomlinson\nreported memory safety bugs present in Thunderbird ESR 68.7. Some of these\nbugs showed evidence of memory corruption and we presume that with enough\neffort some of these could have been exploited to run arbitrary code\n(CVE-2020-12395).\n\nBy encoding Unicode whitespace characters within the From email header,\nan attacker can spoof the sender email address that Thunderbird displays\n(CVE-2020-12397).\n",
  "related": [
    "CVE-2020-6831",
    "CVE-2020-12387",
    "CVE-2020-12392",
    "CVE-2020-12395",
    "CVE-2020-12397"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2020-0209.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=26595"
    },
    {
      "type": "REPORT",
      "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/"
    },
    {
      "type": "REPORT",
      "url": "https://www.thunderbird.net/en-US/thunderbird/68.8.0/releasenotes/"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:7",
        "name": "thunderbird",
        "purl": "pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-7"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "68.8.0-1.mga7"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:7",
        "name": "thunderbird-l10n",
        "purl": "pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-7"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "68.8.0-1.mga7"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
