First published: Tue Apr 07 2020(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.7 | 68.7 |
Mozilla Firefox ESR | <68.7 | 68.7 |
Mozilla Firefox | <75 | 75 |
Mozilla Firefox | <75.0 | |
Mozilla Firefox ESR | <68.7.0 | |
Mozilla Thunderbird | <68.7.0 | |
debian/firefox | 132.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.0esr-1~deb12u1 1:128.4.0esr-1 1:128.4.2esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-6821 is a vulnerability in Mozilla Firefox and Thunderbird that allows potential sensitive data disclosure when reading from areas outside the source resource with WebGL's copyTexSubImage method.
Mozilla Firefox (up to version 75.0), Mozilla Firefox ESR (up to version 68.7.0), and Mozilla Thunderbird (up to version 68.7.0) are affected by CVE-2020-6821.
CVE-2020-6821 has a severity rating of high.
Update your Mozilla Firefox or Thunderbird to the latest version available to mitigate CVE-2020-6821.
You can find more information about CVE-2020-6821 on Mozilla's security advisories and the MITRE CVE database.