When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/#CVE-2020-26970
Acknowledgments: Name: the Mozilla project Upstream: Chiaki Ishikawa
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5398 https://access.redhat.com/errata/RHSA-2020:5398
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2020:5399 https://access.redhat.com/errata/RHSA-2020:5399
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-26970
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:5400 https://access.redhat.com/errata/RHSA-2020:5400
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:5644 https://access.redhat.com/errata/RHSA-2020:5644
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:5645 https://access.redhat.com/errata/RHSA-2020:5645