MGASA-2022-0157

Source
https://advisories.mageia.org/MGASA-2022-0157.html
Import Source
https://advisories.mageia.org/MGASA-2022-0157.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0157
Related
Published
2022-04-28T22:46:19Z
Modified
2022-04-28T22:01:23Z
Summary
Updated thunderbird packages fix security vulnerabilities
Details

The updated thunderbird packages fix security vulnerabilities:

Use-after-free in NSSToken objects (CVE-2022-1097).

Use-after-free after VR Process destruction (CVE-2022-1196).

OpenPGP revocation information was ignored (CVE-2022-1197).

Denial of Service via complex regular expressions (CVE-2022-24713).

xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context (CVE-2022-25235).

xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs (CVE-2022-25236).

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames (CVE-2022-25315).

Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281).

Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282).

Incorrect AliasSet used in JIT Codegen (CVE-2022-28285).

iframe contents could be rendered outside the border (CVE-2022-28286).

Memory safety bugs fixed in Thunderbird 91.8 (CVE-2022-28289).

References
Credits

Affected packages

Mageia:8 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/mageia/thunderbird?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.8.1-1.1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / thunderbird-l10n

Package

Name
thunderbird-l10n
Purl
pkg:rpm/mageia/thunderbird-l10n?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
91.8.1-1.mga8

Ecosystem specific

{
    "section": "core"
}