Mozilla Foundation Security Advisory 2022-53

Security Vulnerabilities fixed in Thunderbird 102.6

Announced
December 13, 2022
Impact
high
Products
Thunderbird
Fixed in
  • Thunderbird 102.6

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

Note: CVE-2022-46874 was originally included in these advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1

#CVE-2022-46880: Use-after-free in WebGL

Reporter
Atte Kettunen
Impact
high
Description

A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.

References

#CVE-2022-46872: Arbitrary file read from a compromised content process

Reporter
Nika Layzell
Impact
high
Description

An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.
This bug only affects Thunderbird for Linux. Other operating systems are unaffected.

References

#CVE-2022-46881: Memory corruption in WebGL

Reporter
Karl and an Anonymous ASAN Nightly User
Impact
high
Description

An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.

References

#CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS

Reporter
Dohyun Lee
Impact
moderate
Description

The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer.
Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.

References

#CVE-2022-46882: Use-after-free in WebGL

Reporter
Irvan Kurniawan
Impact
moderate
Description

A use-after-free in WebGL extensions could have led to a potentially exploitable crash.

References

#CVE-2022-46878: Memory safety bugs fixed in Thunderbird 102.6

Reporter
Mozilla developers
Impact
high
Description

Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References