QID 354001

Date Published: 2022-07-25

QID 354001: Amazon Linux Security Advisory for thunderbird : ALAS2-2022-1828

a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of when displaying the sender of an email, and the sender name contained the braille pattern blank space character multiple times, thunderbird displays all spaces.
This flaw allows an attacker to send an email message with the attackers digital signature that shows an arbitrary sender email address chosen by the attacker.
If the senders name started with a false email address, followed by many braille space characters, the attackers email address was not visible.
Because thunderbird compared the invisible sender address with the signatures email address, if thunderbird accepted the signing key or certificate, the email was shown as having a valid digital signature. (
( CVE-2022-1834) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue as a malicious website that could have learned the size of a cross-origin resource that supported range requests. (
( CVE-2022-31736) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue as a malicious webpage that could have caused an out-of-bounds write in webgl, leading to memory corruption and a potentially exploitable crash. (
( CVE-2022-31737) a flaw was found in mozilla.
The mozilla foundation security advisory describes the issue of when exiting fullscreen mode, an iframe could have confused the browser about the current state of the fullscreen, resulting in potential user confusion or spoofing attacks. (
( CVE-2022-31738) a flaw was found in mozilla.
( CVE-2022-31740) a flaw was found in mozilla.
( CVE-2022-31741) a flaw was found in mozilla.
( CVE-2022-31747)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2022-1828 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2022-1828 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2022-1828.html