thunderbird-68.11.0-1.AXS4
エラータID: AXSA:2020-258:06
リリース日:
2020/08/06 Thursday - 20:46
題名:
thunderbird-68.11.0-1.AXS4
影響のあるチャネル:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Firefox、Thunderbird には、クロスオリジンリダイレクトの結果が漏洩してしまう脆弱性があります。
(CVE-2020-15652)
- Firefox、Thunderbird にはメモリ安全性のバグが存在し、それらのうちのいくつかにメモリ破壊や
任意のコードを実行できる可能性のある脆弱性があります。(CVE-2020-15659)
- Firefox、Thunderbird には開放後使用の脆弱性が存在し、巧妙に細工された HTML ページによって、
リモートの攻撃者がヒープベースのメモリを破壊する可能性のある脆弱性があります。
(CVE-2020-6463)
- Firefox、Thunderbird には不適切な実装が存在し、巧妙に細工された SCTP ストリームによって、
特権的なネットワークの地位を利用した攻撃者がヒープベースのメモリ破壊を行う可能性の
ある脆弱性があります。(CVE-2020-6514)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-15652
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-15659
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-6463
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-6514
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
追加情報:
N/A
ダウンロード:
SRPMS
- thunderbird-68.11.0-1.AXS4.src.rpm
MD5: 2fa14bdb225fa1b9e9ae179280a55925
SHA-256: 740a5f2e6407ae57c2e293120e1c89a1c22cf05bd897903644a0018db21db84c
Size: 522.90 MB
Asianux Server 4 for x86
- thunderbird-68.11.0-1.AXS4.i686.rpm
MD5: 2d13a0ae05385b99cdc757813dd2d217
SHA-256: f7e9c5943de2440b7d63525678f84377b9552f5359cb7dfeb05be62f707fd74a
Size: 109.62 MB
Asianux Server 4 for x86_64
- thunderbird-68.11.0-1.AXS4.x86_64.rpm
MD5: c213d352d53e2e6e6cd1724e96fe83c3
SHA-256: 31082e0c9d194f48e8fdb28d1a77bbc84cab4d0a7d7d42f07520f253d43c6805
Size: 109.34 MB