MGASA-2020-0320

Source
https://advisories.mageia.org/MGASA-2020-0320.html
Import Source
https://advisories.mageia.org/MGASA-2020-0320.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0320
Related
Published
2020-08-18T17:41:27Z
Modified
2020-08-18T15:03:05Z
Summary
Updated thunderbird packages fix security vulnerability
Details

Potential leak of redirect targets when loading scripts in a worker. (CVE-2020-15652)

WebRTC data channel leaks internal address to peer. (CVE-2020-6514)

Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture. (CVE-2020-6463)

Memory safety bugs fixed in Thunderbird 68.11. (CVE-2020-15659)

References
Credits

Affected packages

Mageia:7 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.11.0-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
68.11.0-1.mga7

Ecosystem specific

{
    "section": "core"
}