MGASA-2019-0316

Source
https://advisories.mageia.org/MGASA-2019-0316.html
Import Source
https://advisories.mageia.org/MGASA-2019-0316.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0316
Related
Published
2019-11-07T23:36:48Z
Modified
2019-11-07T22:23:54Z
Summary
Updated thunderbird packages fix security vulnerabilities
Details

The updated packages fix security issues:

Use-after-free when creating index updates in IndexedDB. (CVE-2019-11757)

Potentially exploitable crash due to 360 Total Security. (CVE-2019-11758)

Stack buffer overflow in HKDF output. (CVE-2019-11759)

Stack buffer overflow in WebRTC networking. (CVE-2019-11760)

Unintended access to a privileged JSONView object. (CVE-2019-11761)

document.domain-based origin isolation has same-origin-property violation. (CVE-2019-11762)

Incorrect HTML parsing results in XSS bypass technique. (CVE-2019-11763)

Memory safety bugs fixed in Thunderbird 68.2. (CVE-2019-11764)

Heap overflow in expat library in XML_GetCurrentLineNumber. (CVE-2019-15903)

Enigmail has been updated to 2.1.3.

References
Credits

Affected packages

Mageia:7 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.2.1-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.2.1-1.mga7

Ecosystem specific

{
    "section": "core"
}