{"id":"MGASA-2020-0320","summary":"Updated thunderbird packages fix security vulnerability","details":"Potential leak of redirect targets when loading scripts in a worker.\n(CVE-2020-15652)\n\nWebRTC data channel leaks internal address to peer. (CVE-2020-6514)\n\nUse-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture. (CVE-2020-6463)\n\nMemory safety bugs fixed in Thunderbird 68.11. (CVE-2020-15659)\n","modified":"2026-01-30T17:44:48.754460Z","published":"2020-08-18T17:41:27Z","related":["CVE-2020-15652","CVE-2020-15659","CVE-2020-6463","CVE-2020-6514"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0320.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27025"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/68.11.0/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-35/"},{"type":"REPORT","url":"https://access.redhat.com/errata/RHSA-2020:3344"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"68.11.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0320.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"68.11.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0320.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}