{"id":"ALSA-2022:0845","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 91.7.0.\n\nSecurity Fix(es):\n\n* Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485)\n\n* Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486)\n\n* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)\n\n* expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution (CVE-2022-25236)\n\n* expat: Integer overflow in storeRawNames() (CVE-2022-25315)\n\n* Mozilla: Use-after-free in text reflows (CVE-2022-26381)\n\n* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383)\n\n* Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384)\n\n* Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387)\n\n* thunderbird: Crafted email could trigger an out-of-bounds write (CVE-2022-0566)\n\n* Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T03:18:21.088785Z","published":"2022-03-14T09:49:10Z","related":["CVE-2022-0566","CVE-2022-25235","CVE-2022-25236","CVE-2022-25315","CVE-2022-26381","CVE-2022-26383","CVE-2022-26384","CVE-2022-26386","CVE-2022-26387","CVE-2022-26485","CVE-2022-26486"],"references":[{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-0566"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-25235"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-25236"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-25315"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26381"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26383"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26384"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26386"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26387"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26485"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-26486"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.7.0-2.el8_5.alma"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:0845.json"}},{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.7.0-2.el8_5.alma.plus"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:0845.json"}}],"schema_version":"1.7.3"}