Amazon Linux 2 Security Advisory: ALAS-2020-1496
Advisory Release Date: 2020-09-28 22:12 Pacific
Advisory Updated Date: 2020-09-30 22:12 Pacific
By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed. (cve-2020-15664)
See: https://www.mozilla.org/en-US/security/advisories/mfsa2020-40/#CVE%2D2020%2D15664
When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified. This results in a use-after-free and we presume that with enough effort it could have been exploited to run arbitrary code. (cve-2020-15669)
See: https://www.mozilla.org/en-US/security/advisories/mfsa2020-40/#CVE%2D2020%2D15669
Affected Packages:
thunderbird
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update thunderbird to update your system.
aarch64:
thunderbird-68.12.0-1.amzn2.aarch64
thunderbird-debuginfo-68.12.0-1.amzn2.aarch64
src:
thunderbird-68.12.0-1.amzn2.src
x86_64:
thunderbird-68.12.0-1.amzn2.x86_64
thunderbird-debuginfo-68.12.0-1.amzn2.x86_64