Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-1197 (GCVE-0-2022-1197)
Vulnerability from cvelistv5 – Published: 2022-12-22 00:00 – Updated: 2025-04-16 15:25- OpenPGP revocation information was ignored
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Thunderbird |
Affected:
unspecified , < 91.8
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:55:24.230Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-1197",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T15:25:44.983441Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T15:25:49.637Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "91.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OpenPGP revocation information was ignored",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-22T00:00:00.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2022-1197",
"datePublished": "2022-12-22T00:00:00.000Z",
"dateReserved": "2022-03-31T00:00:00.000Z",
"dateUpdated": "2025-04-16T15:25:49.637Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-1197",
"date": "2026-05-24",
"epss": "0.00239",
"percentile": "0.46996"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"91.8\", \"matchCriteriaId\": \"9DCED53B-8838-45E1-A516-90C99C7DF6F9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.\"}, {\"lang\": \"es\", \"value\": \"Al importar una clave revocada que especificaba el compromiso de la clave como motivo de revocaci\\u00f3n, Thunderbird no actualizaba la copia existente de la clave que a\\u00fan no hab\\u00eda sido revocada y la clave existente se manten\\u00eda como no revocada. Las declaraciones de revocaci\\u00f3n que utilizaban otro motivo de revocaci\\u00f3n o que no especificaban un motivo de revocaci\\u00f3n no se vieron afectadas. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.8.\"}]",
"id": "CVE-2022-1197",
"lastModified": "2024-11-21T06:40:14.190",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}]}",
"published": "2022-12-22T20:15:13.143",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1754985\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-15/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1754985\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-15/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-1197\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2022-12-22T20:15:13.143\",\"lastModified\":\"2025-04-16T16:15:20.267\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.\"},{\"lang\":\"es\",\"value\":\"Al importar una clave revocada que especificaba el compromiso de la clave como motivo de revocaci\u00f3n, Thunderbird no actualizaba la copia existente de la clave que a\u00fan no hab\u00eda sido revocada y la clave existente se manten\u00eda como no revocada. Las declaraciones de revocaci\u00f3n que utilizaban otro motivo de revocaci\u00f3n o que no especificaban un motivo de revocaci\u00f3n no se vieron afectadas. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.8.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"91.8\",\"matchCriteriaId\":\"9DCED53B-8838-45E1-A516-90C99C7DF6F9\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1754985\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-15/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1754985\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-15/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2022-12-22T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.\"}], \"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Thunderbird\", \"versions\": [{\"version\": \"unspecified\", \"lessThan\": \"91.8\", \"status\": \"affected\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-15/\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1754985\"}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"text\", \"lang\": \"en\", \"description\": \"OpenPGP revocation information was ignored\"}]}]}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:55:24.230Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-15/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1754985\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-1197\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T15:25:44.983441Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T15:25:39.506Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2022-1197\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"assignerShortName\": \"mozilla\", \"dateUpdated\": \"2025-04-16T15:25:49.637Z\", \"dateReserved\": \"2022-03-31T00:00:00.000Z\", \"datePublished\": \"2022-12-22T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-316
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.8 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.8",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28282"
},
{
"name": "CVE-2022-28289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28289"
},
{
"name": "CVE-2022-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1197"
},
{
"name": "CVE-2022-28281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28281"
},
{
"name": "CVE-2022-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1196"
},
{
"name": "CVE-2022-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1097"
},
{
"name": "CVE-2022-24713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24713"
},
{
"name": "CVE-2022-28286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28286"
},
{
"name": "CVE-2022-28285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28285"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-15 du 06 avril 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/"
}
]
}
CERTFR-2022-AVI-316
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.8 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.8",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28282"
},
{
"name": "CVE-2022-28289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28289"
},
{
"name": "CVE-2022-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1197"
},
{
"name": "CVE-2022-28281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28281"
},
{
"name": "CVE-2022-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1196"
},
{
"name": "CVE-2022-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1097"
},
{
"name": "CVE-2022-24713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24713"
},
{
"name": "CVE-2022-28286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28286"
},
{
"name": "CVE-2022-28285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28285"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-15 du 06 avril 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/"
}
]
}
alsa-2022:1301
Vulnerability from osv_almalinux
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 91.8.0.
Security Fix(es):
-
Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097)
-
Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281)
-
Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289)
-
Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196)
-
Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197)
-
Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282)
-
Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285)
-
Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713)
-
Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "thunderbird"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.8.0-1.el8_5.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "thunderbird"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.8.0-1.el8_5.alma.plus"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 91.8.0.\n\nSecurity Fix(es):\n\n* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097)\n\n* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281)\n\n* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289)\n\n* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196)\n\n* Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197)\n\n* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282)\n\n* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285)\n\n* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713)\n\n* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:1301",
"modified": "2022-04-13T07:37:22Z",
"published": "2022-04-11T13:29:58Z",
"references": [
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-1097"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-1196"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-1197"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-24713"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-28281"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-28282"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-28285"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-28286"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-28289"
}
],
"related": [
"CVE-2022-1097",
"CVE-2022-28281",
"CVE-2022-28289",
"CVE-2022-1196",
"CVE-2022-1197",
"CVE-2022-28282",
"CVE-2022-28285",
"CVE-2022-24713",
"CVE-2022-28286"
],
"summary": "Important: thunderbird security update"
}
BDU:2022-04617
Vulnerability from fstec - Published: 05.04.2022{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., Novell Inc., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Mozilla Corp., \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 20.04 LTS (Ubuntu), 8.2 Extended Update Support (Red Hat Enterprise Linux), 15.3 (OpenSUSE Leap), 11 (Debian GNU/Linux), 21.10 (Ubuntu), 8.1 Update Services for SAP Solutions (Red Hat Enterprise Linux), 8.4 Extended Update Support (Red Hat Enterprise Linux), 15.4 (OpenSUSE Leap), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 15 SP3 (Suse Linux Enterprise Desktop), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 15 SP4 (Suse Linux Enterprise Server), 15 SP4 (Suse Linux Enterprise Desktop), \u0434\u043e 91.8 (Thunderbird), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), \u0434\u043e 2.5 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\n\u0414\u043b\u044f Thunderbird:\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2022-15/\n\n\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5/\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2022-1197\nhttps://ubuntu.com/security/notices/USN-5393-1\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \n\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-1197\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2022-1197\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2022-1197.html\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f thunderbird \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:91.13.0+repack-1~deb10u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.04.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.07.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-04617",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-1197",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Ubuntu, OpenSUSE Leap, Suse Linux Enterprise Server, SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Desktop, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Thunderbird, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Canonical Ltd. Ubuntu 20.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 8.2 Extended Update Support , Novell Inc. OpenSUSE Leap 15.3 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , Canonical Ltd. Ubuntu 21.10 , Red Hat Inc. Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions , Red Hat Inc. Red Hat Enterprise Linux 8.4 Extended Update Support , Novell Inc. OpenSUSE Leap 15.4 , Novell Inc. Suse Linux Enterprise Server 15 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3 , Novell Inc. Suse Linux Enterprise Desktop 15 SP3 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Novell Inc. Suse Linux Enterprise Server 15 SP4 , Novell Inc. Suse Linux Enterprise Desktop 15 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4 , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.5 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043f\u043e\u0434\u043f\u0438\u0441\u0438 OpenPGP, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u043e\u0432\u0443\u044e \u0430\u0442\u0430\u043a\u0443",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u042d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (CWE-254)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043f\u043e\u0434\u043f\u0438\u0441\u0438 OpenPGP. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u043e\u0432\u0443\u044e \u0430\u0442\u0430\u043a\u0443",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/\n\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5/\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://ubuntu.com/security/CVE-2022-1197\nhttps://ubuntu.com/security/notices/USN-5393-1\nhttps://security-tracker.debian.org/tracker/CVE-2022-1197\nhttps://access.redhat.com/security/cve/cve-2022-1197\nhttps://www.suse.com/security/cve/CVE-2022-1197.html\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-254",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,8)"
}
FKIE_CVE-2022-1197
Vulnerability from fkie_nvd - Published: 2022-12-22 20:15 - Updated: 2025-04-16 16:155.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1754985 | Issue Tracking, Permissions Required, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-15/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1754985 | Issue Tracking, Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-15/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCED53B-8838-45E1-A516-90C99C7DF6F9",
"versionEndExcluding": "91.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8."
},
{
"lang": "es",
"value": "Al importar una clave revocada que especificaba el compromiso de la clave como motivo de revocaci\u00f3n, Thunderbird no actualizaba la copia existente de la clave que a\u00fan no hab\u00eda sido revocada y la clave existente se manten\u00eda como no revocada. Las declaraciones de revocaci\u00f3n que utilizaban otro motivo de revocaci\u00f3n o que no especificaban un motivo de revocaci\u00f3n no se vieron afectadas. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.8."
}
],
"id": "CVE-2022-1197",
"lastModified": "2025-04-16T16:15:20.267",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-12-22T20:15:13.143",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-H922-MV7W-MHM4
Vulnerability from github – Published: 2022-12-22 21:30 – Updated: 2025-04-16 18:31When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8.
{
"affected": [],
"aliases": [
"CVE-2022-1197"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T20:15:00Z",
"severity": "MODERATE"
},
"details": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.",
"id": "GHSA-h922-mv7w-mhm4",
"modified": "2025-04-16T18:31:35Z",
"published": "2022-12-22T21:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2022-1197
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-1197",
"description": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.",
"id": "GSD-2022-1197"
},
"gsd": {
"affected": [
{
"package": {
"ecosystem": "Mozilla",
"name": "Thunderbird"
},
"ranges": [
{
"events": [
{
"fixed": "91.8"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
}
],
"alias": [
"CVE-2022-1197"
],
"database_specific": {
"GSD": {
"alias": "CVE-2022-1197",
"id": "GSD-2022-1197",
"references": [
"https://www.debian.org/security/2022/dsa-5118",
"https://access.redhat.com/errata/RHSA-2022:1301",
"https://access.redhat.com/errata/RHSA-2022:1302",
"https://access.redhat.com/errata/RHSA-2022:1303",
"https://access.redhat.com/errata/RHSA-2022:1305",
"https://access.redhat.com/errata/RHSA-2022:1326",
"https://www.suse.com/security/cve/CVE-2022-1197.html",
"https://advisories.mageia.org/CVE-2022-1197.html",
"https://ubuntu.com/security/CVE-2022-1197",
"https://security.archlinux.org/CVE-2022-1197",
"https://linux.oracle.com/cve/CVE-2022-1197.html"
]
}
},
"details": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.",
"id": "GSD-2022-1197",
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"modified": "2022-09-27T16:35:18.380766Z",
"osvSchema": {
"aliases": [
"CVE-2022-1197"
],
"details": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8.",
"id": "GSD-2022-1197",
"modified": "2023-12-13T01:19:28.331154Z",
"schema_version": "1.4.0"
},
"references": [
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
},
{
"type": "ADVISORY",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5118"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1305"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1326"
},
{
"type": "ADVISORY",
"url": "https://www.suse.com/security/cve/CVE-2022-1197.html"
},
{
"type": "ADVISORY",
"url": "https://advisories.mageia.org/CVE-2022-1197.html"
},
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/CVE-2022-1197"
},
{
"type": "ADVISORY",
"url": "https://security.archlinux.org/CVE-2022-1197"
},
{
"type": "ADVISORY",
"url": "https://linux.oracle.com/cve/CVE-2022-1197.html"
}
],
"schema_version": "1.3.0",
"summary": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8."
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-1197",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.8"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OpenPGP revocation information was ignored"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-15/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-1197"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.8"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OpenPGP revocation information was ignored"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "91.8",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-1197"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird \u003c 91.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754985"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-15/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-15/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
},
"lastModifiedDate": "2022-12-29T16:40Z",
"publishedDate": "2022-12-22T20:15Z"
}
}
}
RHSA-2022:1301
Vulnerability from csaf_redhat - Published: 2022-04-11 14:18 - Updated: 2025-11-21 18:29A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of NSSToken objects referenced via direct points that could have been accessed unsafely on different threads, leading to a use-after-free and potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: By using a link with rel="localization," a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability, this could have been used for an out-of-bounds memory read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98 and Firefox ESR 91.7. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2022:1301 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072559 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072560 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072561 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072562 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072563 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072564 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072565 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072566 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072963 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2022-1097 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072559 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1097 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1097 | external |
| https://access.redhat.com/security/cve/CVE-2022-1196 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072561 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1196 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1196 | external |
| https://access.redhat.com/security/cve/CVE-2022-1197 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072963 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1197 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1197 | external |
| https://access.redhat.com/security/cve/CVE-2022-24713 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072565 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-24713 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-24713 | external |
| https://access.redhat.com/security/cve/CVE-2022-28281 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072560 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28281 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28281 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://access.redhat.com/security/cve/CVE-2022-28282 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072562 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28282 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28282 | external |
| https://access.redhat.com/security/cve/CVE-2022-28285 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072563 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28285 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28285 | external |
| https://access.redhat.com/security/cve/CVE-2022-28286 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072564 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28286 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28286 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://access.redhat.com/security/cve/CVE-2022-28289 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072566 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28289 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28289 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for thunderbird is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 91.8.0.\n\nSecurity Fix(es):\n\n* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097)\n\n* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281)\n\n* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289)\n\n* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196)\n\n* Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197)\n\n* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282)\n\n* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285)\n\n* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713)\n\n* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1301",
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2072559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072559"
},
{
"category": "external",
"summary": "2072560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560"
},
{
"category": "external",
"summary": "2072561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561"
},
{
"category": "external",
"summary": "2072562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562"
},
{
"category": "external",
"summary": "2072563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563"
},
{
"category": "external",
"summary": "2072564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564"
},
{
"category": "external",
"summary": "2072565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565"
},
{
"category": "external",
"summary": "2072566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566"
},
{
"category": "external",
"summary": "2072963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072963"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1301.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2025-11-21T18:29:50+00:00",
"generator": {
"date": "2025-11-21T18:29:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:1301",
"initial_release_date": "2022-04-11T14:18:50+00:00",
"revision_history": [
{
"date": "2022-04-11T14:18:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-11T14:18:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:29:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_5.src",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_5.src",
"product_id": "thunderbird-0:91.8.0-1.el8_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_5.aarch64",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_5.aarch64",
"product_id": "thunderbird-0:91.8.0-1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"product": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"product_id": "thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debugsource@91.8.0-1.el8_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el8_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_5.ppc64le",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_5.ppc64le",
"product_id": "thunderbird-0:91.8.0-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"product": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"product_id": "thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debugsource@91.8.0-1.el8_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el8_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_5.x86_64",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_5.x86_64",
"product_id": "thunderbird-0:91.8.0-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64",
"product": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64",
"product_id": "thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debugsource@91.8.0-1.el8_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el8_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_5.s390x",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_5.s390x",
"product_id": "thunderbird-0:91.8.0-1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"product": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"product_id": "thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debugsource@91.8.0-1.el8_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el8_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_5.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_5.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_5.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_5.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_5.src",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_5.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64"
},
"product_reference": "thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le"
},
"product_reference": "thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x"
},
"product_reference": "thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
},
"product_reference": "thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1097",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of NSSToken objects referenced via direct points that could have been accessed unsafely on different threads, leading to a use-after-free and potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free in NSSToken objects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1097"
},
{
"category": "external",
"summary": "RHBZ#2072559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Use-after-free in NSSToken objects"
},
{
"cve": "CVE-2022-1196",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072561"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free after VR Process destruction",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1196"
},
{
"category": "external",
"summary": "RHBZ#2072561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Use-after-free after VR Process destruction"
},
{
"cve": "CVE-2022-1197",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072963"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: OpenPGP revocation information was ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1197"
},
{
"category": "external",
"summary": "RHBZ#2072963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: OpenPGP revocation information was ignored"
},
{
"cve": "CVE-2022-24713",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072565"
}
],
"notes": [
{
"category": "description",
"text": "regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it\u0027s considered part of the crate\u0027s API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it\u0027s possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Denial of Service via complex regular expressions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24713"
},
{
"category": "external",
"summary": "RHBZ#2072565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mozilla: Denial of Service via complex regular expressions"
},
{
"cve": "CVE-2022-28281",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072560"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nIf a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Out of bounds write due to unexpected WebAuthN Extensions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28281"
},
{
"category": "external",
"summary": "RHBZ#2072560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28281"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28281",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28281"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28281",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28281"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Out of bounds write due to unexpected WebAuthN Extensions"
},
{
"cve": "CVE-2022-28282",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072562"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: By using a link with rel=\"localization,\" a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free in DocumentL10n::TranslateDocument",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28282"
},
{
"category": "external",
"summary": "RHBZ#2072562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Use-after-free in DocumentL10n::TranslateDocument"
},
{
"cve": "CVE-2022-28285",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072563"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability, this could have been used for an out-of-bounds memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Incorrect AliasSet used in JIT Codegen",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28285"
},
{
"category": "external",
"summary": "RHBZ#2072563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Incorrect AliasSet used in JIT Codegen"
},
{
"cve": "CVE-2022-28286",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072564"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: iframe contents could be rendered outside the border",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28286"
},
{
"category": "external",
"summary": "RHBZ#2072564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28286",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28286"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28286",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28286"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mozilla: iframe contents could be rendered outside the border"
},
{
"cve": "CVE-2022-28289",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072566"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nMozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98 and Firefox ESR 91.7. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28289"
},
{
"category": "external",
"summary": "RHBZ#2072566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28289",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28289"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28289",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28289"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1301"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.src",
"AppStream-8.5.0.Z.MAIN:thunderbird-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debuginfo-0:91.8.0-1.el8_5.x86_64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.aarch64",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.ppc64le",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.s390x",
"AppStream-8.5.0.Z.MAIN:thunderbird-debugsource-0:91.8.0-1.el8_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8"
}
]
}
RHSA-2022:1302
Vulnerability from csaf_redhat - Published: 2022-04-11 14:55 - Updated: 2025-11-21 18:29A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of NSSToken objects referenced via direct points that could have been accessed unsafely on different threads, leading to a use-after-free and potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: By using a link with rel="localization," a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability, this could have been used for an out-of-bounds memory read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98 and Firefox ESR 91.7. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2022:1302 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072559 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072560 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072561 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072562 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072563 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072564 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072565 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072566 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072963 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2022-1097 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072559 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1097 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1097 | external |
| https://access.redhat.com/security/cve/CVE-2022-1196 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072561 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1196 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1196 | external |
| https://access.redhat.com/security/cve/CVE-2022-1197 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072963 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1197 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1197 | external |
| https://access.redhat.com/security/cve/CVE-2022-24713 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072565 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-24713 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-24713 | external |
| https://access.redhat.com/security/cve/CVE-2022-28281 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072560 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28281 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28281 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://access.redhat.com/security/cve/CVE-2022-28282 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072562 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28282 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28282 | external |
| https://access.redhat.com/security/cve/CVE-2022-28285 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072563 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28285 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28285 | external |
| https://access.redhat.com/security/cve/CVE-2022-28286 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072564 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28286 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28286 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://access.redhat.com/security/cve/CVE-2022-28289 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072566 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28289 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28289 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for thunderbird is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 91.8.0.\n\nSecurity Fix(es):\n\n* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097)\n\n* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281)\n\n* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289)\n\n* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196)\n\n* Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197)\n\n* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282)\n\n* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285)\n\n* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713)\n\n* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1302",
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2072559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072559"
},
{
"category": "external",
"summary": "2072560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560"
},
{
"category": "external",
"summary": "2072561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561"
},
{
"category": "external",
"summary": "2072562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562"
},
{
"category": "external",
"summary": "2072563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563"
},
{
"category": "external",
"summary": "2072564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564"
},
{
"category": "external",
"summary": "2072565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565"
},
{
"category": "external",
"summary": "2072566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566"
},
{
"category": "external",
"summary": "2072963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072963"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1302.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2025-11-21T18:29:50+00:00",
"generator": {
"date": "2025-11-21T18:29:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:1302",
"initial_release_date": "2022-04-11T14:55:42+00:00",
"revision_history": [
{
"date": "2022-04-11T14:55:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-11T14:55:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:29:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el7_9.src",
"product": {
"name": "thunderbird-0:91.8.0-1.el7_9.src",
"product_id": "thunderbird-0:91.8.0-1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el7_9.x86_64",
"product": {
"name": "thunderbird-0:91.8.0-1.el7_9.x86_64",
"product_id": "thunderbird-0:91.8.0-1.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el7_9.ppc64le",
"product": {
"name": "thunderbird-0:91.8.0-1.el7_9.ppc64le",
"product_id": "thunderbird-0:91.8.0-1.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64"
},
"product_reference": "thunderbird-0:91.8.0-1.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1097",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of NSSToken objects referenced via direct points that could have been accessed unsafely on different threads, leading to a use-after-free and potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free in NSSToken objects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1097"
},
{
"category": "external",
"summary": "RHBZ#2072559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Use-after-free in NSSToken objects"
},
{
"cve": "CVE-2022-1196",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072561"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free after VR Process destruction",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1196"
},
{
"category": "external",
"summary": "RHBZ#2072561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Use-after-free after VR Process destruction"
},
{
"cve": "CVE-2022-1197",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072963"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: OpenPGP revocation information was ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1197"
},
{
"category": "external",
"summary": "RHBZ#2072963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: OpenPGP revocation information was ignored"
},
{
"cve": "CVE-2022-24713",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072565"
}
],
"notes": [
{
"category": "description",
"text": "regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it\u0027s considered part of the crate\u0027s API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it\u0027s possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Denial of Service via complex regular expressions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24713"
},
{
"category": "external",
"summary": "RHBZ#2072565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mozilla: Denial of Service via complex regular expressions"
},
{
"cve": "CVE-2022-28281",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072560"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nIf a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Out of bounds write due to unexpected WebAuthN Extensions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28281"
},
{
"category": "external",
"summary": "RHBZ#2072560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28281"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28281",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28281"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28281",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28281"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Out of bounds write due to unexpected WebAuthN Extensions"
},
{
"cve": "CVE-2022-28282",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072562"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: By using a link with rel=\"localization,\" a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free in DocumentL10n::TranslateDocument",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28282"
},
{
"category": "external",
"summary": "RHBZ#2072562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Use-after-free in DocumentL10n::TranslateDocument"
},
{
"cve": "CVE-2022-28285",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072563"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability, this could have been used for an out-of-bounds memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Incorrect AliasSet used in JIT Codegen",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28285"
},
{
"category": "external",
"summary": "RHBZ#2072563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Incorrect AliasSet used in JIT Codegen"
},
{
"cve": "CVE-2022-28286",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072564"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: iframe contents could be rendered outside the border",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28286"
},
{
"category": "external",
"summary": "RHBZ#2072564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28286",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28286"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28286",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28286"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mozilla: iframe contents could be rendered outside the border"
},
{
"cve": "CVE-2022-28289",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072566"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nMozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98 and Firefox ESR 91.7. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28289"
},
{
"category": "external",
"summary": "RHBZ#2072566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28289",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28289"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28289",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28289"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T14:55:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Client-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Client-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Server-optional-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Server-optional-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.src",
"7Workstation-7.9.Z:thunderbird-0:91.8.0-1.el7_9.x86_64",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.ppc64le",
"7Workstation-7.9.Z:thunderbird-debuginfo-0:91.8.0-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8"
}
]
}
RHSA-2022:1303
Vulnerability from csaf_redhat - Published: 2022-04-11 13:52 - Updated: 2025-11-21 18:29A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of NSSToken objects referenced via direct points that could have been accessed unsafely on different threads, leading to a use-after-free and potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: By using a link with rel="localization," a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potentially exploitable crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability, this could have been used for an out-of-bounds memory read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98 and Firefox ESR 91.7. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2022:1303 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072559 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072560 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072561 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072562 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072563 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072564 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072565 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072566 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072963 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2022-1097 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072559 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1097 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1097 | external |
| https://access.redhat.com/security/cve/CVE-2022-1196 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072561 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1196 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1196 | external |
| https://access.redhat.com/security/cve/CVE-2022-1197 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072963 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-1197 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-1197 | external |
| https://access.redhat.com/security/cve/CVE-2022-24713 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072565 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-24713 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-24713 | external |
| https://access.redhat.com/security/cve/CVE-2022-28281 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072560 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28281 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28281 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://access.redhat.com/security/cve/CVE-2022-28282 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072562 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28282 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28282 | external |
| https://access.redhat.com/security/cve/CVE-2022-28285 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072563 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28285 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28285 | external |
| https://access.redhat.com/security/cve/CVE-2022-28286 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072564 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28286 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28286 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://access.redhat.com/security/cve/CVE-2022-28289 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2072566 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-28289 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-28289 | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
| https://www.mozilla.org/en-US/security/advisories… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 91.8.0.\n\nSecurity Fix(es):\n\n* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097)\n\n* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281)\n\n* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289)\n\n* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196)\n\n* Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197)\n\n* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282)\n\n* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285)\n\n* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713)\n\n* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1303",
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2072559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072559"
},
{
"category": "external",
"summary": "2072560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560"
},
{
"category": "external",
"summary": "2072561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561"
},
{
"category": "external",
"summary": "2072562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562"
},
{
"category": "external",
"summary": "2072563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563"
},
{
"category": "external",
"summary": "2072564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564"
},
{
"category": "external",
"summary": "2072565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565"
},
{
"category": "external",
"summary": "2072566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566"
},
{
"category": "external",
"summary": "2072963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072963"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1303.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2025-11-21T18:29:50+00:00",
"generator": {
"date": "2025-11-21T18:29:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:1303",
"initial_release_date": "2022-04-11T13:52:47+00:00",
"revision_history": [
{
"date": "2022-04-11T13:52:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-11T13:52:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:29:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_1.src",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_1.src",
"product_id": "thunderbird-0:91.8.0-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_1.ppc64le",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_1.ppc64le",
"product_id": "thunderbird-0:91.8.0-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"product": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"product_id": "thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debugsource@91.8.0-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:91.8.0-1.el8_1.x86_64",
"product": {
"name": "thunderbird-0:91.8.0-1.el8_1.x86_64",
"product_id": "thunderbird-0:91.8.0-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@91.8.0-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64",
"product": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64",
"product_id": "thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debugsource@91.8.0-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"product_id": "thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@91.8.0-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_1.src",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:91.8.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64"
},
"product_reference": "thunderbird-0:91.8.0-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le"
},
"product_reference": "thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
},
"product_reference": "thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1097",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of NSSToken objects referenced via direct points that could have been accessed unsafely on different threads, leading to a use-after-free and potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free in NSSToken objects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1097"
},
{
"category": "external",
"summary": "RHBZ#2072559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Use-after-free in NSSToken objects"
},
{
"cve": "CVE-2022-1196",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072561"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free after VR Process destruction",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1196"
},
{
"category": "external",
"summary": "RHBZ#2072561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Use-after-free after VR Process destruction"
},
{
"cve": "CVE-2022-1197",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072963"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn\u0027t specify a revocation reason, were unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: OpenPGP revocation information was ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1197"
},
{
"category": "external",
"summary": "RHBZ#2072963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1197"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: OpenPGP revocation information was ignored"
},
{
"cve": "CVE-2022-24713",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072565"
}
],
"notes": [
{
"category": "description",
"text": "regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it\u0027s considered part of the crate\u0027s API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it\u0027s possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Denial of Service via complex regular expressions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24713"
},
{
"category": "external",
"summary": "RHBZ#2072565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mozilla: Denial of Service via complex regular expressions"
},
{
"cve": "CVE-2022-28281",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072560"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nIf a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Out of bounds write due to unexpected WebAuthN Extensions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28281"
},
{
"category": "external",
"summary": "RHBZ#2072560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28281"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28281",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28281"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28281",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28281"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Out of bounds write due to unexpected WebAuthN Extensions"
},
{
"cve": "CVE-2022-28282",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072562"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: By using a link with rel=\"localization,\" a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potentially exploitable crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Use-after-free in DocumentL10n::TranslateDocument",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28282"
},
{
"category": "external",
"summary": "RHBZ#2072562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Use-after-free in DocumentL10n::TranslateDocument"
},
{
"cve": "CVE-2022-28285",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072563"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability, this could have been used for an out-of-bounds memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Incorrect AliasSet used in JIT Codegen",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28285"
},
{
"category": "external",
"summary": "RHBZ#2072563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Incorrect AliasSet used in JIT Codegen"
},
{
"cve": "CVE-2022-28286",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072564"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: iframe contents could be rendered outside the border",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28286"
},
{
"category": "external",
"summary": "RHBZ#2072564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28286",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28286"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28286",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28286"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mozilla: iframe contents could be rendered outside the border"
},
{
"cve": "CVE-2022-28289",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2072566"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\r\n\r\nMozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98 and Firefox ESR 91.7. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28289"
},
{
"category": "external",
"summary": "RHBZ#2072566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28289",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-28289"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28289",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/#CVE-2022-28289"
}
],
"release_date": "2022-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-11T13:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1303"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:thunderbird-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debuginfo-0:91.8.0-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:thunderbird-debugsource-0:91.8.0-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.