[MFSA-2022-53] Security Vulnerabilities fixed in Thunderbird 102.6
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.*
*Note*: CVE-2022-46874 was originally included in these advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1
CVE-2022-46872: Arbitrary file read from a compromised content process (high)
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.
This bug only affects Thunderbird for Linux. Other operating systems are unaffected.CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS (moderate)
The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer.
Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.CVE-2022-46878: Memory safety bugs fixed in Thunderbird 102.6 (high)
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.CVE-2022-46880: Use-after-free in WebGL (high)
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.CVE-2022-46881: Memory corruption in WebGL (high)
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.CVE-2022-46882: Use-after-free in WebGL (moderate)
A use-after-free in WebGL extensions could have led to a potentially exploitable crash.
Package | Affected Version |
---|---|
pkg:mozilla/Thunderbird | < 102.6 |
Package | Fixed Version |
---|---|
pkg:mozilla/Thunderbird | = 102.6 |
- ID
- MFSA-2022-53
- Severity
- high
- URL
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
- Published
-
2022-12-13T00:00:00
(21 months ago) - Modified
-
2022-12-13T00:00:00
(21 months ago) - Other Advisories
-
- ALAS2-2023-1951
- ALPINE:CVE-2022-46872
- ALPINE:CVE-2022-46875
- ALPINE:CVE-2022-46878
- ALPINE:CVE-2022-46880
- ALPINE:CVE-2022-46881
- ALPINE:CVE-2022-46882
- ALSA-2022:9065
- ALSA-2022:9067
- ALSA-2022:9074
- ALSA-2022:9080
- DSA-5301-1
- DSA-5303-1
- ELSA-2022-9065
- ELSA-2022-9067
- ELSA-2022-9072
- ELSA-2022-9074
- ELSA-2022-9079
- ELSA-2022-9080
- GLSA-202305-06
- GLSA-202305-13
- MFSA-2022-40
- MFSA-2022-44
- MFSA-2022-47
- MFSA-2022-51
- MFSA-2022-52
- RHSA-2022:9065
- RHSA-2022:9067
- RHSA-2022:9072
- RHSA-2022:9074
- RHSA-2022:9079
- RHSA-2022:9080
- RLSA-2022:9067
- SSA:2022-348-01
- SSA:2022-348-02
- SUSE-SU-2022:4460-1
- SUSE-SU-2022:4461-1
- SUSE-SU-2022:4462-1
- SUSE-SU-2022:4579-1
- USN-5782-1
- USN-5824-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:mozilla/Thunderbird | Thunderbird | < 102.6 | ||||
Fixed | pkg:mozilla/Thunderbird | Thunderbird | = 102.6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |