Synopsis:          Important: thunderbird security update
Advisory ID:       SLSA-2022:8555-1
Issue Date:        2022-11-22
CVE Numbers:       CVE-2022-45403
                   CVE-2022-45404
                   CVE-2022-45405
                   CVE-2022-45406
                   CVE-2022-45408
                   CVE-2022-45409
                   CVE-2022-45410
                   CVE-2022-45411
                   CVE-2022-45412
                   CVE-2022-45416
                   CVE-2022-45418
                   CVE-2022-45420
                   CVE-2022-45421
--

This update upgrades Thunderbird to version 102.5.0.

Security Fix(es):

* Mozilla: Service Workers might have learned size of cross-origin media
files (CVE-2022-45403)

* Mozilla: Fullscreen notification bypass (CVE-2022-45404)

* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)

* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)

* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)

* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)

* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
(CVE-2022-45421)

* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie
policy (CVE-2022-45410)

* Mozilla: Cross-Site Tracing was possible via non-standard override
headers (CVE-2022-45411)

* Mozilla: Symlinks may resolve to partially uninitialized buffers(CVE-2022-45412)

* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)

* Mozilla: Custom mouse cursor could have been drawn over browser UI
(CVE-2022-45418)

* Mozilla: Iframe contents could be rendered outside the iframe
(CVE-2022-45420)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

SL7
  x86_64
    thunderbird-102.5.0-2.el7_9.x86_64.rpm
    thunderbird-debuginfo-102.5.0-2.el7_9.x86_64.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2022-8555-1 Important: thunderbird on SL7.x x86_64

This update upgrades Thunderbird to version 102.5.0

Summary

Important: thunderbird security update



Security Fixes

* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403)
* Mozilla: Fullscreen notification bypass (CVE-2022-45404)
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405)
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406)
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408)
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409)
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421)
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410)
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411)
* Mozilla: Symlinks may resolve to partially uninitialized buffers(CVE-2022-45412)
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416)
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418)
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE
SL7 x86_64 thunderbird-102.5.0-2.el7_9.x86_64.rpm thunderbird-debuginfo-102.5.0-2.el7_9.x86_64.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2022:8555-1
Issued Date: : 2022-11-22
CVE Numbers: CVE-2022-45403
CVE-2022-45404
CVE-2022-45405

Related News