* CVE-2020-15652 Description: "By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script." * CVE-2020-6514 Description: "WebRTC used the memory address of a class instance as a connection identifier. Unfortunately, this value is often transmitted to the peer, which allows bypassing ASLR." * CVE-2020-6463 Description: "Crafted media files could lead to a race in texture caches, resulting in a use-after-free, memory corruption, and a potentially exploitable crash." * CVE-2020-15659 Description: "Mozilla developers Jason Kratzer and Luke Wagner reported memory safety bugs present in Thunderbird 68.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."
This issue was resolved and addressed in GLSA 202007-64 at https://security.gentoo.org/glsa/202007-64 by GLSA coordinator Sam James (sam_c).