[RHSA-2022:9079] thunderbird security update
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.6.0.
Security Fix(es):
Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872)
Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878)
Mozilla: Use-after-free in WebGL (CVE-2022-46880)
Mozilla: Memory corruption in WebGL (CVE-2022-46881)
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content (CVE-2022-45414)
Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874)
Mozilla: Use-after-free in WebGL (CVE-2022-46882)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-7.9 | < 102.6.0-2.el7_9 |
pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-7.9 | < 102.6.0-2.el7_9 |
- ID
- RHSA-2022:9079
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:9079
- Published
-
2022-12-15T00:00:00
(21 months ago) - Modified
-
2022-12-15T00:00:00
(21 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2023-1951
- ALPINE:CVE-2022-46872
- ALPINE:CVE-2022-46874
- ALPINE:CVE-2022-46878
- ALPINE:CVE-2022-46880
- ALPINE:CVE-2022-46881
- ALPINE:CVE-2022-46882
- ALSA-2022:9065
- ALSA-2022:9067
- ALSA-2022:9074
- ALSA-2022:9080
- DSA-5301-1
- DSA-5303-1
- ELSA-2022-9065
- ELSA-2022-9067
- ELSA-2022-9072
- ELSA-2022-9074
- ELSA-2022-9079
- ELSA-2022-9080
- GLSA-202305-06
- GLSA-202305-13
- MFSA-2022-40
- MFSA-2022-44
- MFSA-2022-47
- MFSA-2022-50
- MFSA-2022-51
- MFSA-2022-52
- MFSA-2022-53
- MFSA-2022-54
- RHSA-2022:9065
- RHSA-2022:9067
- RHSA-2022:9072
- RHSA-2022:9074
- RHSA-2022:9080
- RLSA-2022:9067
- SSA:2022-336-01
- SSA:2022-348-01
- SSA:2022-348-02
- SSA:2022-355-01
- SUSE-SU-2022:4334-1
- SUSE-SU-2022:4460-1
- SUSE-SU-2022:4461-1
- SUSE-SU-2022:4462-1
- SUSE-SU-2022:4579-1
- SUSE-SU-2022:4636-1
- USN-5782-1
- USN-5824-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2149868 | https://bugzilla.redhat.com/2149868 | |
Bugzilla | 2153441 | https://bugzilla.redhat.com/2153441 | |
Bugzilla | 2153449 | https://bugzilla.redhat.com/2153449 | |
Bugzilla | 2153454 | https://bugzilla.redhat.com/2153454 | |
Bugzilla | 2153463 | https://bugzilla.redhat.com/2153463 | |
Bugzilla | 2153466 | https://bugzilla.redhat.com/2153466 | |
Bugzilla | 2153467 | https://bugzilla.redhat.com/2153467 | |
RHSA | RHSA-2022:9079 | https://access.redhat.com/errata/RHSA-2022:9079 | |
CVE | CVE-2022-45414 | https://access.redhat.com/security/cve/CVE-2022-45414 | |
CVE | CVE-2022-46872 | https://access.redhat.com/security/cve/CVE-2022-46872 | |
CVE | CVE-2022-46874 | https://access.redhat.com/security/cve/CVE-2022-46874 | |
CVE | CVE-2022-46878 | https://access.redhat.com/security/cve/CVE-2022-46878 | |
CVE | CVE-2022-46880 | https://access.redhat.com/security/cve/CVE-2022-46880 | |
CVE | CVE-2022-46881 | https://access.redhat.com/security/cve/CVE-2022-46881 | |
CVE | CVE-2022-46882 | https://access.redhat.com/security/cve/CVE-2022-46882 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-7.9 | redhat | thunderbird | < 102.6.0-2.el7_9 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/thunderbird?arch=ppc64le&distro=redhat-7.9 | redhat | thunderbird | < 102.6.0-2.el7_9 | redhat-7.9 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |