thunderbird-68.10.0-1.AXS4
エラータID: AXSA:2020-225:05
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 68.10.0.
Security Fix(es):
* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418)
* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419)
* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420)
* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)
CVE-2020-12418
Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
CVE-2020-12419
When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
CVE-2020-12420
When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
CVE-2020-12421
When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
Update packages.
Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
N/A
SRPMS
- thunderbird-68.10.0-1.AXS4.src.rpm
MD5: 6be4703dccc7fd5cf5dcded250508129
SHA-256: e3b8578641c583fa5eac6b215d0d041c0536884e51d1dac23ad916d189240516
Size: 516.66 MB
Asianux Server 4 for x86
- thunderbird-68.10.0-1.AXS4.i686.rpm
MD5: 69e7398fd30455ba58f40fb16bf18227
SHA-256: 76a6b62a491cdee1fd4a7301828748be25e28292be04c67d8a996c4ea2b37582
Size: 109.60 MB
Asianux Server 4 for x86_64
- thunderbird-68.10.0-1.AXS4.x86_64.rpm
MD5: 49e4f74127ae5341ae65d99d5c849c67
SHA-256: 226e4625d888a1c4f61d02ba5ab38a0b09b618551c3b28f6c4e0d7e85f1b2792
Size: 109.32 MB