[RHSA-2022:4892] thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 91.10.0.
Security Fix(es):
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email (CVE-2022-1834)
Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736)
Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737)
Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738)
Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740)
Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741)
Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747)
Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-9.0 | < 91.10.0-1.el9_0 |
pkg:rpm/redhat/thunderbird?arch=s390x&distro=redhat-9.0 | < 91.10.0-1.el9_0 |
pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-9.0 | < 91.10.0-1.el9_0 |
pkg:rpm/redhat/thunderbird?arch=aarch64&distro=redhat-9.0 | < 91.10.0-1.el9_0 |
- ID
- RHSA-2022:4892
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:4892
- Published
-
2022-06-03T00:00:00
(2 years ago) - Modified
-
2022-06-03T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2022-1828
- ALPINE:CVE-2022-1834
- ALPINE:CVE-2022-31736
- ALPINE:CVE-2022-31737
- ALPINE:CVE-2022-31738
- ALPINE:CVE-2022-31740
- ALPINE:CVE-2022-31741
- ALPINE:CVE-2022-31742
- ALPINE:CVE-2022-31747
- DSA-5156-1
- DSA-5158-1
- ELSA-2022-4870
- ELSA-2022-4872
- ELSA-2022-4873
- ELSA-2022-4887
- ELSA-2022-4891
- ELSA-2022-4892
- GLSA-202208-08
- GLSA-202208-14
- MFSA-2022-20
- MFSA-2022-21
- MFSA-2022-22
- RHSA-2022:4870
- RHSA-2022:4872
- RHSA-2022:4873
- RHSA-2022:4887
- RHSA-2022:4891
- RLSA-2022:4872
- RLSA-2022:4887
- SSA:2022-151-01
- SSA:2022-153-01
- SUSE-SU-2022:1920-1
- SUSE-SU-2022:1921-1
- SUSE-SU-2022:1927-1
- SUSE-SU-2022:2031-1
- SUSE-SU-2022:2062-1
- SUSE-SU-2022:2533-1
- SUSE-SU-2022:2533-2
- SUSE-SU-2022:2595-1
- USN-5475-1
- USN-5494-1
- USN-5512-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-9.0 | redhat | thunderbird | < 91.10.0-1.el9_0 | redhat-9.0 | x86_64 | |
Affected | pkg:rpm/redhat/thunderbird?arch=s390x&distro=redhat-9.0 | redhat | thunderbird | < 91.10.0-1.el9_0 | redhat-9.0 | s390x | |
Affected | pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-9.0 | redhat | thunderbird | < 91.10.0-1.el9_0 | redhat-9.0 | ppc64le | |
Affected | pkg:rpm/redhat/thunderbird?arch=aarch64&distro=redhat-9.0 | redhat | thunderbird | < 91.10.0-1.el9_0 | redhat-9.0 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |