CVE-2022-45421
Published: 16 November 2022
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Notes
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
mdeslaur | starting with Ubuntu 22.04, the firefox package is just a script that installs the Firefox snap |
Priority
Status
Package | Release | Status |
---|---|---|
mozjs78 Launchpad, Ubuntu, Debian |
kinetic |
Ignored
(end of life, was needs-triage)
|
bionic |
Does not exist
|
|
focal |
Does not exist
|
|
jammy |
Needs triage
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
lunar |
Needs triage
|
|
mantic |
Does not exist
|
|
firefox Launchpad, Ubuntu, Debian |
xenial |
Ignored
(end of standard support)
|
bionic |
Not vulnerable
(107.0+build2-0ubuntu0.18.04.1)
|
|
focal |
Not vulnerable
|
|
jammy |
Not vulnerable
|
|
kinetic |
Not vulnerable
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(107.0-1)
|
|
lunar |
Not vulnerable
|
|
mantic |
Not vulnerable
|
|
mozjs68 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
xenial |
Does not exist
|
|
bionic |
Does not exist
|
|
focal |
Needs triage
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
mozjs91 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
jammy |
Needs triage
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
thunderbird Launchpad, Ubuntu, Debian |
bionic |
Released
(1:102.7.1+build2-0ubuntu0.18.04.1)
|
focal |
Released
(1:102.7.1+build2-0ubuntu0.20.04.1)
|
|
jammy |
Released
(1:102.7.1+build2-0ubuntu0.22.04.1)
|
|
kinetic |
Released
(1:102.7.1+build2-0ubuntu0.22.10.1)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(1:102.5.0-1)
|
|
xenial |
Ignored
(end of standard support)
|
|
lunar |
Released
(1:102.7.1+build2-0ubuntu1)
|
|
mantic |
Released
(1:102.7.1+build2-0ubuntu1)
|
|
mozjs38 Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mozjs52 Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Needs triage
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-47/#CVE-2022-45421
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-48/#CVE-2022-45421
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-49/#CVE-2022-45421
- https://ubuntu.com/security/notices/USN-5726-1
- https://ubuntu.com/security/notices/USN-5824-1
- NVD
- Launchpad
- Debian