Gentoo alert 202211-05 (thunderbird-bin)
From: | glsamaker@gentoo.org | |
To: | gentoo-announce@lists.gentoo.org | |
Subject: | [gentoo-announce] [ GLSA 202211-05 ] Mozilla Thunderbird: Multiple Vulnerabilities | |
Date: | Tue, 22 Nov 2022 03:50:47 -0000 | |
Message-ID: | <166908904801.9.12589517231991027453@2ac734cbf5a7> |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202211-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Mozilla Thunderbird: Multiple Vulnerabilities Date: November 22, 2022 Bugs: #881407 ID: 202211-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. Background ========== Mozilla Thunderbird is a popular open-source email client from the Mozilla project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 mail-client/thunderbird < 102.5.0 >= 102.5.0 2 mail-client/thunderbird-bin < 102.5.0 >= 102.5.0 Description =========== Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Thunderbird binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.5.0" All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.5.0" References ========== [ 1 ] CVE-2022-45403 https://nvd.nist.gov/vuln/detail/CVE-2022-45403 [ 2 ] CVE-2022-45404 https://nvd.nist.gov/vuln/detail/CVE-2022-45404 [ 3 ] CVE-2022-45405 https://nvd.nist.gov/vuln/detail/CVE-2022-45405 [ 4 ] CVE-2022-45406 https://nvd.nist.gov/vuln/detail/CVE-2022-45406 [ 5 ] CVE-2022-45408 https://nvd.nist.gov/vuln/detail/CVE-2022-45408 [ 6 ] CVE-2022-45409 https://nvd.nist.gov/vuln/detail/CVE-2022-45409 [ 7 ] CVE-2022-45410 https://nvd.nist.gov/vuln/detail/CVE-2022-45410 [ 8 ] CVE-2022-45411 https://nvd.nist.gov/vuln/detail/CVE-2022-45411 [ 9 ] CVE-2022-45412 https://nvd.nist.gov/vuln/detail/CVE-2022-45412 [ 10 ] CVE-2022-45416 https://nvd.nist.gov/vuln/detail/CVE-2022-45416 [ 11 ] CVE-2022-45418 https://nvd.nist.gov/vuln/detail/CVE-2022-45418 [ 12 ] CVE-2022-45420 https://nvd.nist.gov/vuln/detail/CVE-2022-45420 [ 13 ] CVE-2022-45421 https://nvd.nist.gov/vuln/detail/CVE-2022-45421 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202211-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5