[ALSA-2022:6708] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2022-10-14
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.3.0. Security Fix(es): * Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag (CVE-2022-3033) * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) * Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) * Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) * Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked (CVE-2022-3032) * Mozilla: An iframe element in an HTML email could trigger a network request (CVE-2022-3034) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2022-36059) * Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958) * Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) * Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-102.3.0-3.el8_6.alma.aarch64.rpm 09044814d1f4f8c58bab49c546fdb3f3d22e85e42440dc0bc5c535edd71b1468
ppc64le thunderbird-102.3.0-3.el8_6.alma.ppc64le.rpm 233ca6667aa7fe51f331155832110e91dc973c1b1e3a24f8ef7ab977d42e772a
s390x thunderbird-102.3.0-3.el8_6.alma.s390x.rpm 55e84337706c8933d0d74c0f168da4783f7351eb2f55d937e637e259cf34259e
x86_64 thunderbird-102.3.0-3.el8_6.alma.x86_64.rpm 02d53fcb33e72cb6977bae6468c062faec116c61d5cdfc210b162e1d6c150d39
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.