ALAS2-2020-1487


Amazon Linux 2 Security Advisory: ALAS-2020-1487
Advisory Release Date: 2020-09-01 00:40 Pacific
Advisory Updated Date: 2020-09-02 18:18 Pacific
Severity: Important

Issue Overview:

Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (CVE-2020-6463)

By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1. (CVE-2020-15652)

Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1. (CVE-2020-15659)

Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream. (CVE-2020-6514)


Affected Packages:

thunderbird


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update thunderbird to update your system.

New Packages:
aarch64:
    thunderbird-68.11.0-1.amzn2.aarch64
    thunderbird-debuginfo-68.11.0-1.amzn2.aarch64

src:
    thunderbird-68.11.0-1.amzn2.src

x86_64:
    thunderbird-68.11.0-1.amzn2.x86_64
    thunderbird-debuginfo-68.11.0-1.amzn2.x86_64