{"id":"MGASA-2022-0475","summary":"Updated firefox packages fix security vulnerability","details":"An attacker who compromised a content process could have partially escaped\nthe sandbox to read arbitrary files via clipboard-related IPC messages\n(CVE-2022-46872).\n\nA drag-and-dropped file with a long filename could have had its filename\ntruncated to remove the valid extension, leaving a malicious extension in\nits place. This could potentially led to user confusion and the execution\nof malicious code (CVE-2022-46874).\n\nMozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the\nMozilla Fuzzing Team reported memory safety bugs present in Firefox ESR\n102.5. Some of these bugs showed evidence of memory corruption and we\npresume that with  enough effort some of these could have been exploited\nto run arbitrary code (CVE-2022-46878).\n\nA missing check related to tex units could have led to a use-after-free in\nWebGL and potentially exploitable crash (CVE-2022-46880).\n\nAn optimization in WebGL was incorrect in some cases, and could have led\nto memory corruption and a potentially exploitable crash (CVE-2022-46881).\n\nA use-after-free in WebGL extensions could have led to a potentially\nexploitable crash (CVE-2022-46882).\n","modified":"2026-02-04T03:38:01.013810Z","published":"2022-12-17T20:37:44Z","related":["CVE-2022-46872","CVE-2022-46874","CVE-2022-46878","CVE-2022-46880","CVE-2022-46881","CVE-2022-46882"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0475.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31272"},{"type":"REPORT","url":"https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/NqCkaX216zY"},{"type":"REPORT","url":"https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_86.html"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-52/"}],"affected":[{"package":{"name":"firefox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.6.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0475.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.6.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0475.json"}},{"package":{"name":"nss","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.86.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0475.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}