QID 353266

Date Published: 2022-04-28

QID 353266: Amazon Linux Security Advisory for thunderbird : ALAS2-2022-1789

the mozilla foundation security advisory describes this flaw as: nsstoken objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. (
( CVE-2022-1097) the mozilla foundation security advisory describes this flaw as: after a vr process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. (
( CVE-2022-1196) the mozilla foundation security advisory describes this flaw as: when importing a revoked key that specified key compromise as the revocation reason, thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked.
Revocation statements that used another revocation reason, or that didnt specify a revocation reason, were unaffected. (
( CVE-2022-1197) regex is an implementation of regular expressions for the rust language.
The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes.
Those (tunable) mitigations already provide sane defaults to prevent attacks.
This guarantee is documented and its considered part of the crates api.
Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and its possible to craft regexes that bypass such mitigations.
This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes.
The fix is include starting from regex 1.5.5.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2022-1789 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2022-1789 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2022-1789.html