{"id":"ALSA-2022:5482","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.\nThis update upgrades Thunderbird to version 91.11.\nSecurity Fix(es):\n* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468)\n* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470)\n* Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479)\n* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484)\n* Mozilla: Undesired attributes could be set as part of prototype pollution (CVE-2022-2200)\n* Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid (CVE-2022-2226)\n* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744)\n* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472)\n* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T03:19:13.799230Z","published":"2022-07-01T00:00:00Z","related":["CVE-2022-2200","CVE-2022-2226","CVE-2022-31744","CVE-2022-34468","CVE-2022-34470","CVE-2022-34472","CVE-2022-34479","CVE-2022-34481","CVE-2022-34484"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2200"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2226"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31744"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-34468"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-34470"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-34472"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-34479"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-34481"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-34484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102161"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102163"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102164"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2102204"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2022-5482.html"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.11.0-2.el9_0.alma"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:5482.json"}}],"schema_version":"1.7.3"}