{"id":"USN-5345-1","summary":"thunderbird vulnerabilities","details":"Multiple security issues were discovered in Thunderbird. If a user were\ntricked into opening a specially crafted website in a browsing context,\nan attacker could potentially exploit these to cause a denial of service,\nbypass security restrictions, obtain sensitive information, cause\nundefined behaviour, spoof the browser UI, or execute arbitrary code.\n(CVE-2022-22759, CVE-2022-22760, CVE-2022-22761, CVE-2022-22763,\nCVE-2022-22764, CVE-2022-26381, CVE-2022-26383, CVE-2022-26384)\n\nIt was discovered that extensions of a particular type could auto-update\nthemselves and bypass the prompt that requests permissions. If a user\nwere tricked into installing a specially crafted extension, an attacker\ncould potentially exploit this to bypass security restrictions.\n(CVE-2022-22754)\n\nIt was discovered that dragging and dropping an image into a folder could\nresult in it being marked as executable. If a user were tricked into\ndragging and dropping a specially crafted image, an attacker could\npotentially exploit this to execute arbitrary code. (CVE-2022-22756)\n\nIt was discovered that files downloaded to /tmp were accessible to other\nusers. A local attacker could exploit this to obtain sensitive\ninformation. (CVE-2022-26386)\n\nA TOCTOU bug was discovered when verifying addon signatures during\ninstall. A local attacker could potentially exploit this to trick a\nuser into installing an addon with an invalid signature.\n(CVE-2022-26387)\n\nAn out-of-bounds write by one byte was discovered when processing\nmessages in some circumstances. If a user were tricked into opening a\nspecially crafted message, an attacker could potentially exploit this\nto cause a denial of service. (CVE-2022-0566)\n","modified":"2026-04-22T10:22:34.372969Z","published":"2022-03-23T22:44:15Z","related":["UBUNTU-CVE-2022-0566","UBUNTU-CVE-2022-22754","UBUNTU-CVE-2022-22756","UBUNTU-CVE-2022-22759","UBUNTU-CVE-2022-22760","UBUNTU-CVE-2022-22761","UBUNTU-CVE-2022-22763","UBUNTU-CVE-2022-22764","UBUNTU-CVE-2022-26381","UBUNTU-CVE-2022-26383","UBUNTU-CVE-2022-26384","UBUNTU-CVE-2022-26386","UBUNTU-CVE-2022-26387"],"upstream":["CVE-2022-0566","CVE-2022-22754","CVE-2022-22756","CVE-2022-22759","CVE-2022-22760","CVE-2022-22761","CVE-2022-22763","CVE-2022-22764","CVE-2022-26381","CVE-2022-26383","CVE-2022-26384","CVE-2022-26386","CVE-2022-26387","UBUNTU-CVE-2022-0566","UBUNTU-CVE-2022-22754","UBUNTU-CVE-2022-22756","UBUNTU-CVE-2022-22759","UBUNTU-CVE-2022-22760","UBUNTU-CVE-2022-22761","UBUNTU-CVE-2022-22763","UBUNTU-CVE-2022-22764","UBUNTU-CVE-2022-26381","UBUNTU-CVE-2022-26383","UBUNTU-CVE-2022-26384","UBUNTU-CVE-2022-26386","UBUNTU-CVE-2022-26387"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5345-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0566"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22754"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22756"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22759"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22760"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22761"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22763"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22764"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26381"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26383"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26384"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26386"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26387"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:91.7.0+build2-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:91.7.0+build2-0ubuntu0.18.04.1"}]}],"versions":["1:52.4.0+build1-0ubuntu2","1:52.6.0+build1-0ubuntu1","1:52.7.0+build1-0ubuntu1","1:52.8.0+build1-0ubuntu0.18.04.1","1:52.9.1+build3-0ubuntu0.18.04.1","1:60.2.1+build1-0ubuntu0.18.04.2","1:60.4.0+build2-0ubuntu0.18.04.1","1:60.5.1+build2-0ubuntu0.18.04.1","1:60.6.1+build2-0ubuntu0.18.04.1","1:60.7.0+build1-0ubuntu0.18.04.1","1:60.7.1+build1-0ubuntu0.18.04.1","1:60.7.2+build2-0ubuntu0.18.04.1","1:60.8.0+build1-0ubuntu0.18.04.1","1:60.9.0+build1-0ubuntu0.18.04.1","1:68.2.1+build1-0ubuntu0.18.04.1","1:68.2.2+build1-0ubuntu0.18.04.1","1:68.4.1+build1-0ubuntu0.18.04.1","1:68.7.0+build1-0ubuntu0.18.04.1","1:68.8.0+build2-0ubuntu0.18.04.2","1:68.10.0+build1-0ubuntu0.18.04.1","1:78.8.1+build1-0ubuntu0.18.04.1","1:78.11.0+build1-0ubuntu0.18.04.2","1:78.13.0+build1-0ubuntu0.18.04.1","1:78.14.0+build1-0ubuntu0.18.04.1","1:78.14.0+build1-0ubuntu0.18.04.2","1:91.5.0+build1-0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"thunderbird","binary_version":"1:91.7.0+build2-0ubuntu0.18.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:91.7.0+build2-0ubuntu0.18.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:91.7.0+build2-0ubuntu0.18.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:91.7.0+build2-0ubuntu0.18.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:91.7.0+build2-0ubuntu0.18.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:91.7.0+build2-0ubuntu0.18.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5345-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-0566"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22754"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22756"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22759"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22760"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22761"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22763"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22764"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26381"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26383"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26384"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26386"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26387"}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:91.7.0+build2-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:91.7.0+build2-0ubuntu0.20.04.1"}]}],"versions":["1:68.1.2+build1-0ubuntu1","1:68.1.2+build1-0ubuntu2","1:68.2.1+build1-0ubuntu1","1:68.2.2+build1-0ubuntu1","1:68.3.0+build2-0ubuntu1","1:68.3.1+build1-0ubuntu2","1:68.4.1+build1-0ubuntu1","1:68.4.2+build2-0ubuntu1","1:68.5.0+build1-0ubuntu1","1:68.6.0+build2-0ubuntu1","1:68.7.0+build1-0ubuntu1","1:68.7.0+build1-0ubuntu2","1:68.8.0+build2-0ubuntu0.20.04.2","1:68.10.0+build1-0ubuntu0.20.04.1","1:78.7.1+build1-0ubuntu0.20.04.1","1:78.8.1+build1-0ubuntu0.20.04.1","1:78.11.0+build1-0ubuntu0.20.04.2","1:78.13.0+build1-0ubuntu0.20.04.2","1:78.14.0+build1-0ubuntu0.20.04.1","1:78.14.0+build1-0ubuntu0.20.04.2","1:91.5.0+build1-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"thunderbird","binary_version":"1:91.7.0+build2-0ubuntu0.20.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:91.7.0+build2-0ubuntu0.20.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:91.7.0+build2-0ubuntu0.20.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:91.7.0+build2-0ubuntu0.20.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:91.7.0+build2-0ubuntu0.20.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:91.7.0+build2-0ubuntu0.20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5345-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-0566"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22754"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22756"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22759"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22760"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22761"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22763"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-22764"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26381"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26383"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26384"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26386"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26387"}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.5"}