9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
52.6%
CentOS Errata and Security Advisory CESA-2022:4891
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 91.10.0.
Security Fix(es):
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email (CVE-2022-1834)
Mozilla: Cross-Origin resource’s length leaked (CVE-2022-31736)
Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737)
Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738)
Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740)
Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741)
Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747)
Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2022-August/086311.html
Affected packages:
thunderbird
Upstream details at:
https://access.redhat.com/errata/RHSA-2022:4891
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | thunderbird | < 91.10.0-1.el7.centos | thunderbird-91.10.0-1.el7.centos.x86_64.rpm |