First published: Wed Nov 06 2019(Updated: )
Mozilla Thunderbird is a standalone mail and newsgroup client.<br>This update upgrades Thunderbird to version 68.2.0.<br>Security Fix(es):<br><li> Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)</li> <li> Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)</li> <li> Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)</li> <li> Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)</li> <li> Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)</li> <li> Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)</li> <li> Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)</li> <li> Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)</li> <li> expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <68.2.0-2.el6_10 | 68.2.0-2.el6_10 |
redhat/thunderbird | <68.2.0-2.el6_10 | 68.2.0-2.el6_10 |
redhat/thunderbird-debuginfo | <68.2.0-2.el6_10 | 68.2.0-2.el6_10 |
redhat/thunderbird-debuginfo | <68.2.0-2.el6_10 | 68.2.0-2.el6_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.