Thunderbird 91.5.0 fixes several security issues
#1
Information 
Quote:
[Image: thunderbird-91.5.0.webp]

Thunderbird 91.5.0 Stable is a security update that addresses several issues in the open source email client.The new version of Thunderbird Stable is already available. It is pushed to user systems, provided that automatic updating has not been disabled.

Thunderbird users may run manual checks for updates to install the update early. Select Help > About Thunderbird to display the installed version and have Thunderbird run a check for updates manually. Users who don't see the menubar need to press the Alt-key on the keyboard to display it.

The official release notes list just three entries: two refer to fixed issues in the email client, one links to the security advisories page, which details the fixed security issues in the client.

The two non-security issues that were fixed address a display issue for RSS keyword labels and missing information on Thunderbird's about dialog page.

The security advisories page for Thunderbird 91.5 lists 14 security issues, many of which come from the code that Thunderbird shares with the Firefox web browser.

The highest severity rating of all vulnerabilities is high, second only to the critical rating. Here is the full list of security issues patched in the new Thunderbird version:
  1. CVE-2022-22746: Calling into reportValidity could have lead to fullscreen window spoof
  2. CVE-2022-22743: Browser window spoof using fullscreen mode
  3. CVE-2022-22742: Out-of-bounds memory access when inserting text in edit mode
  4. CVE-2022-22741: Browser window spoof using fullscreen mode
  5. CVE-2022-22740: Use-after-free of ChannelEventQueue::mOwner
  6. CVE-2022-22738: Heap-buffer-overflow in blendGaussianBlur
  7. CVE-2022-22737: Race condition when playing audio files
  8. CVE-2021-4140: Iframe sandbox bypass with XSLT
  9. CVE-2022-22748: Spoofed origin on external protocol launch dialog
  10. CVE-2022-22745: Leaking cross-origin URLs through securitypolicyviolation event
  11. CVE-2022-22744: The 'Copy as curl' feature in DevTools did not fully escape website-controlled data, potentially leading to command injection
  12. CVE-2022-22747: Crash when handling empty pkcs7 sequence
  13. CVE-2022-22739: Missing throttling on external protocol launch dialog
  14. CVE-2022-22751: Memory safety bugs fixed in Thunderbird 91.5
Now You: do you use Thunderbird? What would you like to see supported?
...
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • ismail
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] Master PDF Editor Mothe...
It lets me edit, com...zevish — 09:52
XYplorer
What's new in Rele...Kool — 07:35
AMD releases updated FidelityFX SDK feat...
FidelityFX SDK 1.1...harlan4096 — 06:44
AnyDesk 9.5.2 for Windows
AnyDesk 9.5.2 for ...harlan4096 — 06:42
LibreOffice 24.8.7
Berlin, 8 May 2025...harlan4096 — 06:42

[-]
Birthdays
Today's Birthdays
avatar (38)omapek
avatar (47)Geraldtuh
Upcoming Birthdays
avatar (27)akiratoriyama
avatar (47)Jerrycix
avatar (39)awedoli
avatar (81)WinRARHowTo
avatar (37)owysykan
avatar (48)beautgok
avatar (38)axuben
avatar (44)talsmanthago
avatar (30)mocetor
avatar (45)piomaibhaict
avatar (50)kingbfef
avatar (37)izenesiq
avatar (39)ihijudu
avatar (44)tiojusop
avatar (41)Damiennug
avatar (39)acoraxe
avatar (48)contjrat
avatar (40)axylisyb
avatar (43)tukrublape
avatar (43)knigiJow
avatar (45)1stOnecal
avatar (49)Mirzojap
avatar (35)idilysaju
avatar (39)GregoryRog
avatar (44)mediumog
avatar (39)odukoromu
avatar (45)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>