[MFSA-2022-53] Security Vulnerabilities fixed in Thunderbird 102.6

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 6

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.*

*Note*: CVE-2022-46874 was originally included in these advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1

  • CVE-2022-46872: Arbitrary file read from a compromised content process (high)
    An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.
    This bug only affects Thunderbird for Linux. Other operating systems are unaffected.

  • CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS (moderate)
    The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer.
    Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.

  • CVE-2022-46878: Memory safety bugs fixed in Thunderbird 102.6 (high)
    Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

  • CVE-2022-46880: Use-after-free in WebGL (high)
    A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.

  • CVE-2022-46881: Memory corruption in WebGL (high)
    An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.

  • CVE-2022-46882: Use-after-free in WebGL (moderate)
    A use-after-free in WebGL extensions could have led to a potentially exploitable crash.

Package Affected Version
pkg:mozilla/Thunderbird < 102.6
Package Fixed Version
pkg:mozilla/Thunderbird = 102.6
Source # ID Name URL
Bugzilla 1799156 https://bugzilla.mozilla.org/show_bug.cgi?id=1799156
Bugzilla 1786188 https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
Bugzilla 1782219 Memory safety bugs fixed in Thunderbird 102.6 https://bugzilla.mozilla.org/show_bug.cgi?id=1782219
Bugzilla 1797370 Memory safety bugs fixed in Thunderbird 102.6 https://bugzilla.mozilla.org/show_bug.cgi?id=1797370
Bugzilla 1797685 Memory safety bugs fixed in Thunderbird 102.6 https://bugzilla.mozilla.org/show_bug.cgi?id=1797685
Bugzilla 1801102 Memory safety bugs fixed in Thunderbird 102.6 https://bugzilla.mozilla.org/show_bug.cgi?id=1801102
Bugzilla 1801315 Memory safety bugs fixed in Thunderbird 102.6 https://bugzilla.mozilla.org/show_bug.cgi?id=1801315
Bugzilla 1802395 Memory safety bugs fixed in Thunderbird 102.6 https://bugzilla.mozilla.org/show_bug.cgi?id=1802395
Bugzilla 1749292 https://bugzilla.mozilla.org/show_bug.cgi?id=1749292
Bugzilla 1770930 https://bugzilla.mozilla.org/show_bug.cgi?id=1770930
Bugzilla 1789371 https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:mozilla/Thunderbird Thunderbird < 102.6
Fixed pkg:mozilla/Thunderbird Thunderbird = 102.6
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...