Updated thunderbird packages fix security vulnerabilities
Publication date: 21 Nov 2020Modification date: 21 Nov 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-16012 , CVE-2020-26951 , CVE-2020-26953 , CVE-2020-26956 , CVE-2020-26958 , CVE-2020-26959 , CVE-2020-26960 , CVE-2020-26961 , CVE-2020-26965 , CVE-2020-26968
Description
Variable time processing of cross-origin images during drawImage calls. (CVE-2020-16012) Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code. (CVE-2020-26951) Fullscreen could be enabled without displaying the security UI. (CVE-2020-26953) XSS through paste (manual and clipboard API). (CVE-2020-26956) Requests intercepted through ServiceWorkers lacked MIME type restrictions. (CVE-2020-26958) Use-after-free in WebRequestService. (CVE-2020-26959) Potential use-after-free in uses of nsTArray. (CVE-2020-26960) DoH did not filter IPv4 mapped IP Addresses. (CVE-2020-26961) Software keyboards may have remembered typed passwords. (CVE-2020-26965) Memory safety bugs fixed in Thunderbird 78.5. (CVE-2020-26968)
References
- https://bugs.mageia.org/show_bug.cgi?id=27634
- https://www.thunderbird.net/en-US/thunderbird/78.5.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-52/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
SRPMS
7/core
- thunderbird-78.5.0-1.mga7
- thunderbird-l10n-78.5.0-1.mga7