{"id":"USN-5393-1","summary":"thunderbird vulnerabilities","details":"Multiple security issues were discovered in Thunderbird. If a user were\ntricked into opening a specially crafted website in a browsing context, an\nattacker could potentially exploit these to cause a denial of service,\nconduct spoofing attacks, or execute arbitrary code. (CVE-2022-1097,\nCVE-2022-1196, CVE-2022-28281, CVE-2022-28282, CVE-2022-28285,\nCVE-2022-28286, CVE-2022-28289)\n\nIt was discovered that Thunderbird ignored OpenPGP revocation when\nimporting a revoked key in some circumstances. An attacker could\npotentially exploit this by tricking the user into trusting the\nauthenticity of a message or tricking them into use a revoked key to\nsend an encrypted message. (CVE-2022-1197)\n","modified":"2026-04-22T10:22:55.983894Z","published":"2022-04-27T19:44:24Z","related":["UBUNTU-CVE-2022-1097","UBUNTU-CVE-2022-1196","UBUNTU-CVE-2022-1197","UBUNTU-CVE-2022-28281","UBUNTU-CVE-2022-28282","UBUNTU-CVE-2022-28285","UBUNTU-CVE-2022-28286","UBUNTU-CVE-2022-28289"],"upstream":["CVE-2022-1097","CVE-2022-1196","CVE-2022-1197","CVE-2022-28281","CVE-2022-28282","CVE-2022-28285","CVE-2022-28286","CVE-2022-28289","UBUNTU-CVE-2022-1097","UBUNTU-CVE-2022-1196","UBUNTU-CVE-2022-1197","UBUNTU-CVE-2022-28281","UBUNTU-CVE-2022-28282","UBUNTU-CVE-2022-28285","UBUNTU-CVE-2022-28286","UBUNTU-CVE-2022-28289"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5393-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1097"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1196"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1197"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28281"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28282"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28285"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28286"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28289"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:91.8.1+build1-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:91.8.1+build1-0ubuntu0.18.04.1"}]}],"versions":["1:52.4.0+build1-0ubuntu2","1:52.6.0+build1-0ubuntu1","1:52.7.0+build1-0ubuntu1","1:52.8.0+build1-0ubuntu0.18.04.1","1:52.9.1+build3-0ubuntu0.18.04.1","1:60.2.1+build1-0ubuntu0.18.04.2","1:60.4.0+build2-0ubuntu0.18.04.1","1:60.5.1+build2-0ubuntu0.18.04.1","1:60.6.1+build2-0ubuntu0.18.04.1","1:60.7.0+build1-0ubuntu0.18.04.1","1:60.7.1+build1-0ubuntu0.18.04.1","1:60.7.2+build2-0ubuntu0.18.04.1","1:60.8.0+build1-0ubuntu0.18.04.1","1:60.9.0+build1-0ubuntu0.18.04.1","1:68.2.1+build1-0ubuntu0.18.04.1","1:68.2.2+build1-0ubuntu0.18.04.1","1:68.4.1+build1-0ubuntu0.18.04.1","1:68.7.0+build1-0ubuntu0.18.04.1","1:68.8.0+build2-0ubuntu0.18.04.2","1:68.10.0+build1-0ubuntu0.18.04.1","1:78.8.1+build1-0ubuntu0.18.04.1","1:78.11.0+build1-0ubuntu0.18.04.2","1:78.13.0+build1-0ubuntu0.18.04.1","1:78.14.0+build1-0ubuntu0.18.04.1","1:78.14.0+build1-0ubuntu0.18.04.2","1:91.5.0+build1-0ubuntu0.18.04.1","1:91.7.0+build2-0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:91.8.1+build1-0ubuntu0.18.04.1","binary_name":"thunderbird"},{"binary_version":"1:91.8.1+build1-0ubuntu0.18.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:91.8.1+build1-0ubuntu0.18.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:91.8.1+build1-0ubuntu0.18.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:91.8.1+build1-0ubuntu0.18.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:91.8.1+build1-0ubuntu0.18.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5393-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2022-1097","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1196","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1197","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28281","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28282","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28285","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28286","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-28289","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:91.8.1+build1-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:91.8.1+build1-0ubuntu0.20.04.1"}]}],"versions":["1:68.1.2+build1-0ubuntu1","1:68.1.2+build1-0ubuntu2","1:68.2.1+build1-0ubuntu1","1:68.2.2+build1-0ubuntu1","1:68.3.0+build2-0ubuntu1","1:68.3.1+build1-0ubuntu2","1:68.4.1+build1-0ubuntu1","1:68.4.2+build2-0ubuntu1","1:68.5.0+build1-0ubuntu1","1:68.6.0+build2-0ubuntu1","1:68.7.0+build1-0ubuntu1","1:68.7.0+build1-0ubuntu2","1:68.8.0+build2-0ubuntu0.20.04.2","1:68.10.0+build1-0ubuntu0.20.04.1","1:78.7.1+build1-0ubuntu0.20.04.1","1:78.8.1+build1-0ubuntu0.20.04.1","1:78.11.0+build1-0ubuntu0.20.04.2","1:78.13.0+build1-0ubuntu0.20.04.2","1:78.14.0+build1-0ubuntu0.20.04.1","1:78.14.0+build1-0ubuntu0.20.04.2","1:91.5.0+build1-0ubuntu0.20.04.1","1:91.7.0+build2-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:91.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird"},{"binary_version":"1:91.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:91.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:91.8.1+build1-0ubuntu0.20.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:91.8.1+build1-0ubuntu0.20.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:91.8.1+build1-0ubuntu0.20.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5393-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1097","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1196","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1197","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28281","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28282","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28285","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28286","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-28289","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}