Search for packages
Package details: pkg:alpm/archlinux/thunderbird@91.7.0-1
purl pkg:alpm/archlinux/thunderbird@91.7.0-1
Next non-vulnerable version 91.8.0-1
Latest non-vulnerable version 91.10-1
Risk 4.0
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-1dxp-nd2k-aaar
Aliases:
CVE-2022-28289
Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-1jb3-vw3p-aaan
Aliases:
CVE-2022-24713
GHSA-m5pq-gvj9-9vr8
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-cakz-5fn1-aaab
Aliases:
CVE-2022-1196
After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-ea61-ux59-aaad
Aliases:
CVE-2022-28282
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-fd58-uf4r-aaap
Aliases:
CVE-2022-28281
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-jjqc-446b-aaap
Aliases:
CVE-2022-28286
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-ngpq-dbdk-aaac
Aliases:
CVE-2022-28285
When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-rvzp-9cy9-aaam
Aliases:
CVE-2022-1097
<code>NSSToken</code> objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
VCID-ybs8-9qbw-aaak
Aliases:
CVE-2022-1197
When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8.
91.8.0-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-69v9-jknd-aaam An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. CVE-2022-26381
VCID-9e79-r9um-aaag When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. CVE-2022-26387
VCID-mgv8-uy3t-aaag Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behavior was reverted to the original, user-specific directory. <br>*This bug only affects Firefox for macOS and Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.7 and Thunderbird < 91.7. CVE-2022-26386
VCID-npyv-g3uj-aaaj If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. CVE-2022-26384
VCID-wg4g-7st5-aaab When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. CVE-2022-26383

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:45:16.451675+00:00 Arch Linux Importer Fixing VCID-69v9-jknd-aaam https://security.archlinux.org/AVG-2713 36.0.0
2025-03-28T07:45:16.422161+00:00 Arch Linux Importer Fixing VCID-wg4g-7st5-aaab https://security.archlinux.org/AVG-2713 36.0.0
2025-03-28T07:45:16.396436+00:00 Arch Linux Importer Fixing VCID-npyv-g3uj-aaaj https://security.archlinux.org/AVG-2713 36.0.0
2025-03-28T07:45:16.377779+00:00 Arch Linux Importer Fixing VCID-mgv8-uy3t-aaag https://security.archlinux.org/AVG-2713 36.0.0
2025-03-28T07:45:16.358956+00:00 Arch Linux Importer Fixing VCID-9e79-r9um-aaag https://security.archlinux.org/AVG-2713 36.0.0
2025-03-28T07:45:16.143475+00:00 Arch Linux Importer Affected by VCID-rvzp-9cy9-aaam https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:16.115363+00:00 Arch Linux Importer Affected by VCID-cakz-5fn1-aaab https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:16.087946+00:00 Arch Linux Importer Affected by VCID-ybs8-9qbw-aaak https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:16.058135+00:00 Arch Linux Importer Affected by VCID-1jb3-vw3p-aaan https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:16.028510+00:00 Arch Linux Importer Affected by VCID-fd58-uf4r-aaap https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:15.997874+00:00 Arch Linux Importer Affected by VCID-ea61-ux59-aaad https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:15.969484+00:00 Arch Linux Importer Affected by VCID-ngpq-dbdk-aaac https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:15.951058+00:00 Arch Linux Importer Affected by VCID-jjqc-446b-aaap https://security.archlinux.org/AVG-2712 36.0.0
2025-03-28T07:45:15.932365+00:00 Arch Linux Importer Affected by VCID-1dxp-nd2k-aaar https://security.archlinux.org/AVG-2712 36.0.0
2024-09-18T02:00:12.452728+00:00 Arch Linux Importer Fixing VCID-69v9-jknd-aaam https://security.archlinux.org/AVG-2713 34.0.1
2024-09-18T02:00:12.427942+00:00 Arch Linux Importer Fixing VCID-wg4g-7st5-aaab https://security.archlinux.org/AVG-2713 34.0.1
2024-09-18T02:00:12.404580+00:00 Arch Linux Importer Fixing VCID-npyv-g3uj-aaaj https://security.archlinux.org/AVG-2713 34.0.1
2024-09-18T02:00:12.381336+00:00 Arch Linux Importer Fixing VCID-mgv8-uy3t-aaag https://security.archlinux.org/AVG-2713 34.0.1
2024-09-18T02:00:12.356185+00:00 Arch Linux Importer Fixing VCID-9e79-r9um-aaag https://security.archlinux.org/AVG-2713 34.0.1
2024-09-18T02:00:12.101141+00:00 Arch Linux Importer Affected by VCID-rvzp-9cy9-aaam https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:12.080979+00:00 Arch Linux Importer Affected by VCID-cakz-5fn1-aaab https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:12.061686+00:00 Arch Linux Importer Affected by VCID-ybs8-9qbw-aaak https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:12.042095+00:00 Arch Linux Importer Affected by VCID-1jb3-vw3p-aaan https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:12.022488+00:00 Arch Linux Importer Affected by VCID-fd58-uf4r-aaap https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:12.003023+00:00 Arch Linux Importer Affected by VCID-ea61-ux59-aaad https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:11.983356+00:00 Arch Linux Importer Affected by VCID-ngpq-dbdk-aaac https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:11.963364+00:00 Arch Linux Importer Affected by VCID-jjqc-446b-aaap https://security.archlinux.org/AVG-2712 34.0.1
2024-09-18T02:00:11.933737+00:00 Arch Linux Importer Affected by VCID-1dxp-nd2k-aaar https://security.archlinux.org/AVG-2712 34.0.1
2024-01-03T22:26:26.816622+00:00 Arch Linux Importer Fixing VCID-69v9-jknd-aaam https://security.archlinux.org/AVG-2713 34.0.0rc1
2024-01-03T22:26:26.794867+00:00 Arch Linux Importer Fixing VCID-wg4g-7st5-aaab https://security.archlinux.org/AVG-2713 34.0.0rc1
2024-01-03T22:26:26.769997+00:00 Arch Linux Importer Fixing VCID-npyv-g3uj-aaaj https://security.archlinux.org/AVG-2713 34.0.0rc1
2024-01-03T22:26:26.746504+00:00 Arch Linux Importer Fixing VCID-mgv8-uy3t-aaag https://security.archlinux.org/AVG-2713 34.0.0rc1
2024-01-03T22:26:26.724946+00:00 Arch Linux Importer Fixing VCID-9e79-r9um-aaag https://security.archlinux.org/AVG-2713 34.0.0rc1
2024-01-03T22:26:26.510184+00:00 Arch Linux Importer Affected by VCID-rvzp-9cy9-aaam https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.491232+00:00 Arch Linux Importer Affected by VCID-cakz-5fn1-aaab https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.469478+00:00 Arch Linux Importer Affected by VCID-ybs8-9qbw-aaak https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.447484+00:00 Arch Linux Importer Affected by VCID-1jb3-vw3p-aaan https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.425599+00:00 Arch Linux Importer Affected by VCID-fd58-uf4r-aaap https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.401622+00:00 Arch Linux Importer Affected by VCID-ea61-ux59-aaad https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.376916+00:00 Arch Linux Importer Affected by VCID-ngpq-dbdk-aaac https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.353546+00:00 Arch Linux Importer Affected by VCID-jjqc-446b-aaap https://security.archlinux.org/AVG-2712 34.0.0rc1
2024-01-03T22:26:26.326900+00:00 Arch Linux Importer Affected by VCID-1dxp-nd2k-aaar https://security.archlinux.org/AVG-2712 34.0.0rc1