{"schema_version": "1.3.1", "id": "RLSA-2022:6708", "modified": "2023-02-02T14:13:39.298122Z", "published": "2022-09-26T13:56:07Z", "related": ["CVE-2022-3032", "CVE-2022-3033", "CVE-2022-3034", "CVE-2022-36059", "CVE-2022-40956", "CVE-2022-40957", "CVE-2022-40958", "CVE-2022-40959", "CVE-2022-40960", "CVE-2022-40962"], "summary": "Important: thunderbird security update", "details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 102.3.0.\n\nSecurity Fix(es):\n\n* Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag (CVE-2022-3033)\n\n* Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959)\n\n* Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960)\n\n* Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962)\n\n* Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked (CVE-2022-3032)\n\n* Mozilla: An iframe element in an HTML email could trigger a network request (CVE-2022-3034)\n\n* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2022-36059)\n\n* Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958)\n\n* Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956)\n\n* Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "thunderbird", "purl": "pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-8-6-legacy&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:102.3.0-3.el8_6"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2022:6708"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123255"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123256"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123257"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123258"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128792"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128793"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128794"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128795"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128796"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128797"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}