Rocky Linux: RLSA-2022:8547 thunderbird security update | LinuxSec...
{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2022:8547","synopsis":"Important: thunderbird security update","severity":"SEVERITY_IMPORTANT","topic":"An update for thunderbird is now available for Rocky Linux 8.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.","description":"Mozilla Thunderbird is a standalone mail and newsgroup client.\nThis update upgrades Thunderbird to version 102.5.0.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2143197","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143197","description":"CVE-2022-45403 Mozilla: Service Workers might have learned size of cross-origin media files"},{"ticket":"2143198","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143198","description":"CVE-2022-45404 Mozilla: Fullscreen notification bypass"},{"ticket":"2143199","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143199","description":"CVE-2022-45405 Mozilla: Use-after-free in InputStream implementation"},{"ticket":"2143200","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143200","description":"CVE-2022-45406 Mozilla: Use-after-free of a JavaScript Realm"},{"ticket":"2143201","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143201","description":"CVE-2022-45408 Mozilla: Fullscreen notification bypass via windowName"},{"ticket":"2143202","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143202","description":"CVE-2022-45409 Mozilla: Use-after-free in Garbage Collection"},{"ticket":"2143203","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143203","description":"CVE-2022-45410 Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy"},{"ticket":"2143204","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143204","description":"CVE-2022-45411 Mozilla: Cross-Site Tracing was possible via non-standard override headers"},{"ticket":"2143205","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143205","description":"CVE-2022-45412 Mozilla: Symlinks may resolve to partially uninitialized buffers"},{"ticket":"2143240","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143240","description":"CVE-2022-45416 Mozilla: Keystroke Side-Channel Leakage"},{"ticket":"2143241","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143241","description":"CVE-2022-45418 Mozilla: Custom mouse cursor could have been drawn over browser UI"},{"ticket":"2143242","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143242","description":"CVE-2022-45420 Mozilla: Iframe contents could be rendered outside the iframe"},{"ticket":"2143243","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2143243","description":"CVE-2022-45421 Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5"}],"cves":[{"name":"CVE-2022-45403","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45403.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-829"},{"name":"CVE-2022-45404","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45404.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-1021"},{"name":"CVE-2022-45405","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45405.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-416"},{"name":"CVE-2022-45406","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45406.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-416"},{"name":"CVE-2022-45408","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45408.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-1021"},{"name":"CVE-2022-45409","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45409.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-416"},{"name":"CVE-2022-45410","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45410.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":"CWE-1275"},{"name":"CVE-2022-45411","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45411.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":"CWE-79"},{"name":"CVE-2022-45412","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45412.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":"CWE-200"},{"name":"CVE-2022-45416","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45416.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":""},{"name":"CVE-2022-45418","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45418.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":""},{"name":"CVE-2022-45420","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45420.json","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N","cvss3BaseScore":"4.3","cwe":""},{"name":"CVE-2022-45421","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-45421.json","cvss3ScoringVector":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-120"}],"references":[],"publishedAt":"2022-11-22T18:24:23.790560Z","rpms":{},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2022:8547 thunderbird security update

November 22, 2022
An update for thunderbird is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important

Summary

An update for thunderbird is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45403.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45404.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45405.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45406.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45408.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45409.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45410.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45411.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45412.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45416.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45418.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45420.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45421.json

Severity
Name: RLSA-2022:8547
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2143197

https://bugzilla.redhat.com/show_bug.cgi?id=2143198

https://bugzilla.redhat.com/show_bug.cgi?id=2143199

https://bugzilla.redhat.com/show_bug.cgi?id=2143200

https://bugzilla.redhat.com/show_bug.cgi?id=2143201

https://bugzilla.redhat.com/show_bug.cgi?id=2143202

https://bugzilla.redhat.com/show_bug.cgi?id=2143203

https://bugzilla.redhat.com/show_bug.cgi?id=2143204

https://bugzilla.redhat.com/show_bug.cgi?id=2143205

https://bugzilla.redhat.com/show_bug.cgi?id=2143240

https://bugzilla.redhat.com/show_bug.cgi?id=2143241

https://bugzilla.redhat.com/show_bug.cgi?id=2143242

https://bugzilla.redhat.com/show_bug.cgi?id=2143243