ALT-BU-2022-7427-1
Branch p10 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-4556
A vulnerability was found in Alinto SOGo up to 5.7.1 and classified as problematic. Affected by this issue is the function _migrateMailIdentities of the file SoObjects/SOGo/SOGoUserDefaults.m of the component Identity Handler. The manipulation of the argument fullName leads to cross site scripting. The attack may be launched remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is efac49ae91a4a325df9931e78e543f707a0f8e5e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215960.
- https://github.com/Alinto/sogo/commit/efac49ae91a4a325df9931e78e543f707a0f8e5e
- https://github.com/Alinto/sogo/commit/efac49ae91a4a325df9931e78e543f707a0f8e5e
- https://github.com/Alinto/sogo/releases/tag/SOGo-5.8.0
- https://github.com/Alinto/sogo/releases/tag/SOGo-5.8.0
- https://vuldb.com/?id.215960
- https://vuldb.com/?id.215960
Modified: 2024-11-21
CVE-2022-4558
A vulnerability was found in Alinto SOGo up to 5.7.1. It has been classified as problematic. This affects an unknown part of the file SoObjects/SOGo/NSString+Utilities.m of the component Folder/Mail Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is 1e0f5f00890f751e84d67be4f139dd7f00faa5f3. It is recommended to upgrade the affected component. The identifier VDB-215961 was assigned to this vulnerability.
- https://github.com/Alinto/sogo/commit/1e0f5f00890f751e84d67be4f139dd7f00faa5f3
- https://github.com/Alinto/sogo/commit/1e0f5f00890f751e84d67be4f139dd7f00faa5f3
- https://github.com/Alinto/sogo/releases/tag/SOGo-5.8.0
- https://github.com/Alinto/sogo/releases/tag/SOGo-5.8.0
- https://vuldb.com/?id.215961
- https://vuldb.com/?id.215961
Closed bugs
control libnss-role status не работает
Package thunderbird updated to version 102.5.1-alt1 for branch p10 in task 311239.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-45414
If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.