[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RLSA-2022:0845 --- thunderbird

ID: oval:org.secpod.oval:def:4500914Date: (C)2023-04-03   (M)2024-04-25
Class: PATCHFamily: unix




Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.7.0. Security Fix: * Mozilla: Use-after-free in XSLT parameter processing * Mozilla: Use-after-free in WebGPU IPC Framework * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution * expat: Integer overflow in storeRawNames * Mozilla: Use-after-free in text reflows * Mozilla: Browser window spoof using fullscreen mode * Mozilla: iframe allow-scripts sandbox bypass * Mozilla: Time-of-check time-of-use bug when verifying add-on signatures * thunderbird: Crafted email could trigger an out-of-bounds write * Mozilla: Temporary files downloaded to /tmp and accessible by other local users For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Platform:
Rocky Linux 8
Product:
thunderbird
Reference:
RLSA-2022:0845
CVE-2022-0566
CVE-2022-25235
CVE-2022-25236
CVE-2022-25315
CVE-2022-26381
CVE-2022-26383
CVE-2022-26384
CVE-2022-26386
CVE-2022-26387
CVE-2022-26485
CVE-2022-26486
CVE    11
CVE-2022-0566
CVE-2022-25315
CVE-2022-25236
CVE-2022-25235
...
CPE    1
cpe:/a:mozilla:thunderbird

© SecPod Technologies