• [gentoo-announce] [ GLSA 202208-38 ] Mozilla Thunderbird: Multiple Vuln

    From glsamaker@gentoo.org@21:1/5 to All on Thu Sep 1 01:50:01 2022
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202208-38
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Mozilla Thunderbird: Multiple Vulnerabilities
    Date: August 31, 2022
    Bugs: #866217
    ID: 202208-38

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in Mozilla Thunderbird, the
    world of which could result in arbitrary code execution.

    Background
    ==========

    Mozilla Thunderbird is a popular open-source email client from the
    Mozilla project.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 mail-client/thunderbird < 91.13.0 >= 91.13.0
    2 mail-client/thunderbird-bin< 91.13.0 >= 91.13.0

    Description
    ===========

    Multiple vulnerabilities have been discovered in Mozilla Thunderbird.
    Please review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Mozilla Thunderbird binary users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.2.0"

    All Mozilla Thunderbird users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.2.0"

    References
    ==========

    [ 1 ] CVE-2022-38472
    https://nvd.nist.gov/vuln/detail/CVE-2022-38472
    [ 2 ] CVE-2022-38473
    https://nvd.nist.gov/vuln/detail/CVE-2022-38473
    [ 3 ] CVE-2022-38476
    https://nvd.nist.gov/vuln/detail/CVE-2022-38476
    [ 4 ] CVE-2022-38477
    https://nvd.nist.gov/vuln/detail/CVE-2022-38477
    [ 5 ] CVE-2022-38478
    https://nvd.nist.gov/vuln/detail/CVE-2022-38478

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202208-38

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2022 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmMP8IgACgkQFMQkOaVy +9neUA//T0VXt24nMNPc9MKphEyicQiN7cHK/rVXXt5ieURKFLabc/MYbXUu1O96 +KipWaENGFqkR3uOZcN75G9BQt3ndsjAg69cjbR3eyo9VGWipu6IiVmfLPuKxju9 5cuiCZzKfDXPgCC9iXtypewl5jXPm5Z/A+brTRn2dXjml5VjoPqPjwYcTm+V6PZt MF8fIIFxEp+RQemHHRvF492PzC0iF+W1FqTdYo9bLfVXZo9t9Rgi+EMic14OO0Ma tx6ifCnjbEaIjWR69PuT7Sf6+wfGCPf0yi8d1iY9OaghnNMM93g61CmfqTBO4DJ8 ND/p0rWb9Df4dV8LPm14s7ihFPemkhEq4oAHcx5Gz60GQ0tC5oPVDt5uh2zxhRTx uKjCo5h6LnTgM6c2NB7hwHxFe6Imt+5Pbw5NnNbKu50c8og+SXWh7sgH6AX6Ta4T 3z0GlByAp+/xcn2mk2Xcxotfcc6lMHbxf9kmzL/je0sTBPus79EkxRdUsgsXGMrN MHNYYVhszPP2rjsshFF99u1Cz0ji4YuAY4FtuMeTa7jCbSt+pn+Ms7edkC3ZT8p3 NiDL0KBqhEmr1KV4S2Z6RWwHkPfXUnjspu2JZdT3HlVLo0e2DICMKm3x8qqn38B4 OdhJY+ETxx133Yom2Rv1y57Cz8g0nTyACEIyjRv6IiHhs5h7TeA=
    =GsxE
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)