{"id":"MGASA-2022-0355","summary":"Updated thunderbird packages fix security vulnerability","details":"Improperly formed beacon events can disrupt or impede the matrix-js-sdk\nfrom functioning properly(CVE-2022-39236)\nToo permissive key forwarding strategy allowing impersonation \n(CVE-2022-39249)\nTrusting/verifying the user identity under the control of the homeserver\ninstead of the intended one. (CVE-2022-39250)\nFake to-device messages appearing to originate from another user.\n(CVE-2022-39251)\n","modified":"2026-02-04T04:19:41.099366Z","published":"2022-10-01T17:48:24Z","related":["CVE-2022-39236","CVE-2022-39249","CVE-2022-39250","CVE-2022-39251"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0355.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30911"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-43/"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/102.3.1/releasenotes/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.3.1-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0355.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.3.1-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0355.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}