MGASA-2020-0433

Source
https://advisories.mageia.org/MGASA-2020-0433.html
Import Source
https://advisories.mageia.org/MGASA-2020-0433.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0433
Related
Published
2020-11-21T12:21:00Z
Modified
2020-11-21T11:46:51Z
Summary
Updated thunderbird packages fix security vulnerabilities
Details

Variable time processing of cross-origin images during drawImage calls. (CVE-2020-16012)

Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code. (CVE-2020-26951)

Fullscreen could be enabled without displaying the security UI. (CVE-2020-26953)

XSS through paste (manual and clipboard API). (CVE-2020-26956)

Requests intercepted through ServiceWorkers lacked MIME type restrictions. (CVE-2020-26958)

Use-after-free in WebRequestService. (CVE-2020-26959)

Potential use-after-free in uses of nsTArray. (CVE-2020-26960)

DoH did not filter IPv4 mapped IP Addresses. (CVE-2020-26961)

Software keyboards may have remembered typed passwords. (CVE-2020-26965)

Memory safety bugs fixed in Thunderbird 78.5. (CVE-2020-26968)

References
Credits

Affected packages

Mageia:7 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
78.5.0-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
78.5.0-1.mga7

Ecosystem specific

{
    "section": "core"
}