{"id":"MGASA-2022-0094","summary":"Updated thunderbird packages fix security vulnerabilities","details":"Removing an XSLT parameter during processing could have lead to an\nexploitable use-after-free (CVE-2022-26485).\n\nAn unexpected message in the WebGPU IPC framework could lead to a\nuse-after-free and exploitable sandbox escape (CVE-2022-26486).\n","modified":"2026-02-04T02:22:12.026726Z","published":"2022-03-08T18:56:13Z","related":["CVE-2022-26485","CVE-2022-26486"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0094.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30129"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/91.6.2/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-09/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.6.2-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0094.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"91.6.2-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0094.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}