QID 356285

Date Published: 2023-09-28

QID 356285: Amazon Linux Security Advisory for firefox : ALASFIREFOX-2023-008

the mozilla foundation security advisory describes this flaw as: an attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related ipc messages. *this bug only affects firefox for linux.
Other operating systems are unaffected.* (
( CVE-2022-46872) a file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place.
This could potentially led to user confusion and the execution of malicious code.<br/>*note*: this issue was originally included in the advisories for thunderbird 102.6, but a patch (specific to thunderbird) was omitted, resulting in it actually being fixed in thunderbird 102.6.1.
This vulnerability affects firefox < 108, thunderbird < 102.6.1, thunderbird < 102.6, and firefox esr < 102.6. (
( CVE-2022-46874) the mozilla foundation security advisory describes this flaw as: mozilla developers randell jesup, valentin gosu, olli pettay, and the mozilla fuzzing team reported memory safety bugs present in firefox 107 and firefox esr 102.5.
Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (
( CVE-2022-46878) the mozilla foundation security advisory describes this flaw as: a missing check related to tex units could have led to a use-after-free and potentially exploitable crash. (
( CVE-2022-46880) the mozilla foundation security advisory describes this flaw as: an optimization in webgl was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. (
( CVE-2022-46882)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALASFIREFOX-2023-008 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALASFIREFOX-2023-008 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASFIREFOX-2023-008.html