Improper Authentication Affecting thunderbird-debuginfo package, versions <0:102.4.0-1.el8_6.0.1


Severity

Recommended
0.0
high
0
10

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ROCKY8-THUNDERBIRDDEBUGINFO-3196718
  • published5 Jan 2023
  • disclosed28 Sept 2022

Introduced: 28 Sep 2022

CVE-2022-39251  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:8 thunderbird-debuginfo to version 0:102.4.0-1.el8_6.0.1 or higher.
This issue was patched in RLSA-2022:7190.

NVD Description

Note: Versions mentioned in the description apply only to the upstream thunderbird-debuginfo package and not the thunderbird-debuginfo package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:8 relevant fixed versions and status.

Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.

CVSS Scores

version 3.1