MGASA-2020-0450

Source
https://advisories.mageia.org/MGASA-2020-0450.html
Import Source
https://advisories.mageia.org/MGASA-2020-0450.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0450
Related
Published
2020-12-05T19:46:49Z
Modified
2020-12-05T19:07:22Z
Summary
Updated thunderbird packages fix security vulnerability
Details

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable (CVE-2020-26970).

References
Credits

Affected packages

Mageia:7 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
78.5.1-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
78.5.1-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / rootcerts

Package

Name
rootcerts
Purl
pkg:rpm/mageia/rootcerts?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20201201.00-1.mga7

Ecosystem specific

{
    "section": "core"
}