|
|
Log in / Subscribe / Register

Mageia alert MGASA-2021-0066 (thunderbird)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0066: Updated thunderbird packages fix security vulnerabilities
Date:  Thu, 04 Feb 2021 14:41:30 +0100
Message-ID:  <20210204134130.4BCF89F736@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0066 - Updated thunderbird packages fix security vulnerabilities Publication date: 04 Feb 2021 URL: https://advisories.mageia.org/MGASA-2021-0066.html Type: security Affected Mageia releases: 7 CVE: CVE-2021-23953, CVE-2021-23954, CVE-2020-15685, CVE-2020-26976, CVE-2021-23960, CVE-2021-23964 Description: Cross-origin information leakage via redirected PDF requests. (CVE-2021-23953) Type confusion when using logical assignment operators in JavaScript switch statements. (CVE-2021-23954) IMAP Response Injection when using STARTTLS. (CVE-2020-15685) HTTPS pages could have been intercepted by a registered service worker when they should not have been. (CVE-2020-26976) Use-after-poison for incorrectly redeclared JavaScript variables during GC. (CVE-2021-23960) Memory safety bugs fixed in Thunderbird 78.7. (CVE-2021-23964). References: - https://bugs.mageia.org/show_bug.cgi?id=28247 - https://www.mozilla.org/en-US/security/advisories/mfsa202... - https://www.thunderbird.net/en-US/thunderbird/78.7.0/rele... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 7/core/thunderbird-78.7.0-1.mga7 - 7/core/thunderbird-l10n-78.7.0-1.mga7


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds