MGASA-2020-0170

Source
https://advisories.mageia.org/MGASA-2020-0170.html
Import Source
https://advisories.mageia.org/MGASA-2020-0170.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0170
Related
Published
2020-04-15T10:12:14Z
Modified
2020-04-15T09:45:19Z
Summary
Updated thunderbird packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities:

Use-after-free while running the nsDocShell destructor. (CVE-2020-6819)

Use-after-free when handling a ReadableStream. (CVE-2020-6820)

Uninitialized memory could be read when using the WebGL copyTexSubImage method. (CVE-2020-6821)

Out of bounds write in GMPDecodeData when processing large images. (CVE-2020-6822)

Memory safety bugs fixed in Thunderbird 68.7.0. (CVE-2020-6825)

References
Credits

Affected packages

Mageia:7 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.7.0-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.7.0-1.mga7

Ecosystem specific

{
    "section": "core"
}