Opened 6 months ago
Closed 6 months ago
#17402 closed enhancement (fixed)
|Reported by:||Bruce Dubbs||Owned by:||pierre|
New minor version.
Change History (6)
comment:1 by , 6 months ago
|Priority:||normal → elevated|
comment:2 by , 6 months ago
|Status:||new → assigned|
comment:3 by , 6 months ago
comment:4 by , 6 months ago
Security Vulnerabilities fixed in Thunderbird 102.6
December 13, 2022
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
#CVE-2022-46880: Use-after-free in WebGL
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash. References Bug 1749292
#CVE-2022-46872: Arbitrary file read from a compromised content process
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.
This bug only affects Thunderbird for Linux. Other operating systems are unaffected. References Bug 1799156
#CVE-2022-46881: Memory corruption in WebGL
Karl and an Anonymous ASAN Nightly User
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. References Bug 1770930
#CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code. References Bug 1746139
#CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer.
Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected. References Bug 1786188
#CVE-2022-46882: Use-after-free in WebGL
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. References Bug 1789371
#CVE-2022-46878: Memory safety bugs fixed in Thunderbird 102.6
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. References: Memory safety bugs fixed in Thunderbird 102.6
comment:5 by , 6 months ago
SA at commit 541072272 on www.git.
comment:6 by , 6 months ago
|Status:||assigned → closed|
Fixed at commit fbe38a85