-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: thunderbird security update
Advisory ID:       RHSA-2021:0397-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0397
Issue date:        2021-02-03
CVE Names:         CVE-2020-15685 CVE-2020-26976 CVE-2021-23953 
                   CVE-2021-23954 CVE-2021-23960 CVE-2021-23964 
====================================================================
1. Summary:

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.1) - ppc64le, x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.7.0.

Security Fix(es):

* Mozilla: Cross-origin information leakage via redirected PDF requests
(CVE-2021-23953)

* Mozilla: Type confusion when using logical assignment operators in
JavaScript switch statements (CVE-2021-23954)

* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
(CVE-2021-23964)

* Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685)

* Mozilla: HTTPS pages could have been intercepted by a registered service
worker when they should not have been (CVE-2020-26976)

* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables
during GC (CVE-2021-23960)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of Thunderbird must be restarted for the update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1920646 - CVE-2021-23953 Mozilla: Cross-origin information leakage via redirected PDF requests
1920648 - CVE-2021-23954 Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements
1920649 - CVE-2020-26976 Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been
1920650 - CVE-2021-23960 Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC
1920651 - CVE-2021-23964 Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
1921543 - CVE-2020-15685 Mozilla: IMAP Response Injection when using STARTTLS

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.1):

Source:
thunderbird-78.7.0-1.el8_1.src.rpm

ppc64le:
thunderbird-78.7.0-1.el8_1.ppc64le.rpm
thunderbird-debuginfo-78.7.0-1.el8_1.ppc64le.rpm
thunderbird-debugsource-78.7.0-1.el8_1.ppc64le.rpm

x86_64:
thunderbird-78.7.0-1.el8_1.x86_64.rpm
thunderbird-debuginfo-78.7.0-1.el8_1.x86_64.rpm
thunderbird-debugsource-78.7.0-1.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-15685
https://access.redhat.com/security/cve/CVE-2020-26976
https://access.redhat.com/security/cve/CVE-2021-23953
https://access.redhat.com/security/cve/CVE-2021-23954
https://access.redhat.com/security/cve/CVE-2021-23960
https://access.redhat.com/security/cve/CVE-2021-23964
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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9XId
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-0397:01 Important: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support

Summary

Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.7.0.
Security Fix(es):
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953)
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954)
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964)
* Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685)
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976)
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of Thunderbird must be restarted for the update to take effect.

References

https://access.redhat.com/security/cve/CVE-2020-15685 https://access.redhat.com/security/cve/CVE-2020-26976 https://access.redhat.com/security/cve/CVE-2021-23953 https://access.redhat.com/security/cve/CVE-2021-23954 https://access.redhat.com/security/cve/CVE-2021-23960 https://access.redhat.com/security/cve/CVE-2021-23964 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux AppStream EUS (v. 8.1):
Source: thunderbird-78.7.0-1.el8_1.src.rpm
ppc64le: thunderbird-78.7.0-1.el8_1.ppc64le.rpm thunderbird-debuginfo-78.7.0-1.el8_1.ppc64le.rpm thunderbird-debugsource-78.7.0-1.el8_1.ppc64le.rpm
x86_64: thunderbird-78.7.0-1.el8_1.x86_64.rpm thunderbird-debuginfo-78.7.0-1.el8_1.x86_64.rpm thunderbird-debugsource-78.7.0-1.el8_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:0397-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0397
Issued Date: : 2021-02-03
CVE Names: CVE-2020-15685 CVE-2020-26976 CVE-2021-23953 CVE-2021-23954 CVE-2021-23960 CVE-2021-23964

Topic

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1Extended Update Support.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream EUS (v. 8.1) - ppc64le, x86_64


Bugs Fixed

1920646 - CVE-2021-23953 Mozilla: Cross-origin information leakage via redirected PDF requests

1920648 - CVE-2021-23954 Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements

1920649 - CVE-2020-26976 Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been

1920650 - CVE-2021-23960 Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC

1920651 - CVE-2021-23964 Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7

1921543 - CVE-2020-15685 Mozilla: IMAP Response Injection when using STARTTLS


Related News