MGASA-2021-0066

Source
https://advisories.mageia.org/MGASA-2021-0066.html
Import Source
https://advisories.mageia.org/MGASA-2021-0066.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0066
Related
Published
2021-02-04T13:40:24Z
Modified
2021-02-04T12:59:33Z
Summary
Updated thunderbird packages fix security vulnerabilities
Details

Cross-origin information leakage via redirected PDF requests. (CVE-2021-23953)

Type confusion when using logical assignment operators in JavaScript switch statements. (CVE-2021-23954)

IMAP Response Injection when using STARTTLS. (CVE-2020-15685)

HTTPS pages could have been intercepted by a registered service worker when they should not have been. (CVE-2020-26976)

Use-after-poison for incorrectly redeclared JavaScript variables during GC. (CVE-2021-23960)

Memory safety bugs fixed in Thunderbird 78.7. (CVE-2021-23964).

References
Credits

Affected packages

Mageia:7 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
78.7.0-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
78.7.0-1.mga7

Ecosystem specific

{
    "section": "core"
}