Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-29945 (GCVE-0-2021-29945)
Vulnerability from cvelistv5 – Published: 2021-06-24 13:19 – Updated: 2024-08-03 22:18- Incorrect size computation in WebAssembly JIT could lead to null-reads
| URL | Tags |
|---|---|
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_MISC |
| https://bugzilla.mozilla.org/show_bug.cgi?id=1700690 | x_refsource_MISC |
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 78.10
(custom)
|
|
| Mozilla | Thunderbird |
Affected:
unspecified , < 78.10
(custom)
|
|
| Mozilla | Firefox |
Affected:
unspecified , < 88
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:18:03.472Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "78.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "78.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "88",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Incorrect size computation in WebAssembly JIT could lead to null-reads",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-24T13:19:50.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2021-29945",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "78.10"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "78.10"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "88"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect size computation in WebAssembly JIT could lead to null-reads"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-14/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-16/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-15/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2021-29945",
"datePublished": "2021-06-24T13:19:50.000Z",
"dateReserved": "2021-04-01T00:00:00.000Z",
"dateUpdated": "2024-08-03T22:18:03.472Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-29945",
"date": "2026-05-19",
"epss": "0.00409",
"percentile": "0.61387"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*\", \"versionEndExcluding\": \"88.0\", \"matchCriteriaId\": \"93A024F9-E2A3-4F13-83A3-879EAC032592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*\", \"versionEndExcluding\": \"78.10\", \"matchCriteriaId\": \"504327C0-E11F-4EAC-9ED3-8BEA4C40DD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*\", \"versionEndExcluding\": \"78.10\", \"matchCriteriaId\": \"65A9C7EC-D89C-4C03-841E-9DFED53E5795\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.\"}, {\"lang\": \"es\", \"value\": \"El JIT de WebAssembly pod\\u00eda calcular mal el tama\\u00f1o de un tipo de retorno, lo que pod\\u00eda conllevar a una lectura nula y resultar en un bloqueo. *Nota: Este problema s\\u00f3lo afectaba a las plataformas x86-32. Otras plataformas no est\\u00e1n afectadas. Esta vulnerabilidad afecta a Firefox ESR versiones anteriores a 78.10, Thunderbird versiones anteriores a 78.10 y Firefox versiones anteriores a 88\"}]",
"id": "CVE-2021-29945",
"lastModified": "2024-11-21T06:02:02.030",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-06-24T14:15:09.763",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1700690\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2021-14/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2021-15/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2021-16/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1700690\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2021-14/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2021-15/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2021-16/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-682\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-29945\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2021-06-24T14:15:09.763\",\"lastModified\":\"2024-11-21T06:02:02.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.\"},{\"lang\":\"es\",\"value\":\"El JIT de WebAssembly pod\u00eda calcular mal el tama\u00f1o de un tipo de retorno, lo que pod\u00eda conllevar a una lectura nula y resultar en un bloqueo. *Nota: Este problema s\u00f3lo afectaba a las plataformas x86-32. Otras plataformas no est\u00e1n afectadas. Esta vulnerabilidad afecta a Firefox ESR versiones anteriores a 78.10, Thunderbird versiones anteriores a 78.10 y Firefox versiones anteriores a 88\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-682\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"88.0\",\"matchCriteriaId\":\"93A024F9-E2A3-4F13-83A3-879EAC032592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"78.10\",\"matchCriteriaId\":\"504327C0-E11F-4EAC-9ED3-8BEA4C40DD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"78.10\",\"matchCriteriaId\":\"65A9C7EC-D89C-4C03-841E-9DFED53E5795\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1700690\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-14/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-15/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-16/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1700690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-14/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-15/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-16/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2021-AVI-286
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 78.10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 78.10",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-23995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23995"
},
{
"name": "CVE-2021-23999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23999"
},
{
"name": "CVE-2021-29945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29945"
},
{
"name": "CVE-2021-23998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23998"
},
{
"name": "CVE-2021-29948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29948"
},
{
"name": "CVE-2021-23961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23961"
},
{
"name": "CVE-2021-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29946"
},
{
"name": "CVE-2021-24002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24002"
},
{
"name": "CVE-2021-23994",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23994"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-286",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2021-14 du 19 avril 2021",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14/"
}
]
}
CERTFR-2021-AVI-287
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 88",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 78.10",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-23995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23995"
},
{
"name": "CVE-2021-24000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24000"
},
{
"name": "CVE-2021-23999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23999"
},
{
"name": "CVE-2021-29945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29945"
},
{
"name": "CVE-2021-23996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23996"
},
{
"name": "CVE-2021-29947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29947"
},
{
"name": "CVE-2021-23998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23998"
},
{
"name": "CVE-2021-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24001"
},
{
"name": "CVE-2021-23997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23997"
},
{
"name": "CVE-2021-29944",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29944"
},
{
"name": "CVE-2021-23961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23961"
},
{
"name": "CVE-2021-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29946"
},
{
"name": "CVE-2021-24002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24002"
},
{
"name": "CVE-2021-23994",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23994"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-287",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2021-15 du 19 avril 2021",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2021-16 du 19 avril 2021",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16/"
}
]
}
CERTFR-2021-AVI-286
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 78.10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 78.10",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-23995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23995"
},
{
"name": "CVE-2021-23999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23999"
},
{
"name": "CVE-2021-29945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29945"
},
{
"name": "CVE-2021-23998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23998"
},
{
"name": "CVE-2021-29948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29948"
},
{
"name": "CVE-2021-23961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23961"
},
{
"name": "CVE-2021-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29946"
},
{
"name": "CVE-2021-24002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24002"
},
{
"name": "CVE-2021-23994",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23994"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-286",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2021-14 du 19 avril 2021",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14/"
}
]
}
CERTFR-2021-AVI-287
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 88",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 78.10",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-23995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23995"
},
{
"name": "CVE-2021-24000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24000"
},
{
"name": "CVE-2021-23999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23999"
},
{
"name": "CVE-2021-29945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29945"
},
{
"name": "CVE-2021-23996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23996"
},
{
"name": "CVE-2021-29947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29947"
},
{
"name": "CVE-2021-23998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23998"
},
{
"name": "CVE-2021-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24001"
},
{
"name": "CVE-2021-23997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23997"
},
{
"name": "CVE-2021-29944",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29944"
},
{
"name": "CVE-2021-23961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23961"
},
{
"name": "CVE-2021-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29946"
},
{
"name": "CVE-2021-24002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24002"
},
{
"name": "CVE-2021-23994",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23994"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-287",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2021-15 du 19 avril 2021",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2021-16 du 19 avril 2021",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16/"
}
]
}
BDU:2021-02284
Vulnerability from fstec - Published: 19.04.2021{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., Novell Inc., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Mozilla Corp., \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 12 SP2-BCL (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 8 (Red Hat Enterprise Linux), 12 SP2-BCL (Suse Linux Enterprise Server), 15 (SUSE Linux Enterprise Server for SAP Applications), 15 SP1 (SUSE Linux Enterprise Server for SAP Applications), 11 SP4-LTSS (Suse Linux Enterprise Server), 11 SP4-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP3-LTSS (Suse Linux Enterprise Server), 8 (SUSE OpenStack Cloud), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 12 SP3-BCL (SUSE Linux Enterprise Server for SAP Applications), 12 SP3-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Software Development Kit), Crowbar 8 (SUSE OpenStack Cloud), 10 (Debian GNU/Linux), 6 (SUSE Enterprise Storage), 7.2 \u041c\u0443\u0440\u043e\u043c (\u0420\u0415\u0414 \u041e\u0421), 8 (HPE Helion Openstack), 12 SP3-ESPOS (Suse Linux Enterprise Server), 12 SP3-ESPOS (SUSE Linux Enterprise Server for SAP Applications), 9 (SUSE OpenStack Cloud), 15-ESPOS (SUSE Linux Enterprise High Performance Computing), 15-LTSS (SUSE Linux Enterprise High Performance Computing), 15-LTSS (Suse Linux Enterprise Server), Crowbar 9 (SUSE OpenStack Cloud), 20.04 LTS (Ubuntu), 20.10 (Ubuntu), 15 SP2 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 15 SP2 (SUSE Linux Enterprise Workstation Extension), 15.2 (OpenSUSE Leap), 8.1 Extended Update Support (Red Hat Enterprise Linux), 12 SP4-ESPOS (Suse Linux Enterprise Server), 12 SP4-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP4-ESPOS (SUSE Linux Enterprise Server for SAP Applications), 4.0 (SUSE CaaS Platform), 8.2 Extended Update Support (Red Hat Enterprise Linux), 12 SP4-LTSS (Suse Linux Enterprise Server), 21.04 (Ubuntu), 15 SP1-BCL (Suse Linux Enterprise Server), 15 SP1-LTSS (Suse Linux Enterprise Server), 15 SP2 (SUSE Linux Enterprise Module for Desktop Applications), 15 SP1-LTSS (SUSE Linux Enterprise High Performance Computing), 15 SP1-ESPOS (SUSE Linux Enterprise High Performance Computing), 15 SP3 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 4.0 (SUSE Manager Proxy), 4.0 (SUSE Manager Retail Branch Server), 4.0 (SUSE Manager Server), 15 SP3 (SUSE Linux Enterprise Workstation Extension), 12 SP2-LTSS-ERICSSON (Suse Linux Enterprise Server), 12 SP2-LTSS-SAP (Suse Linux Enterprise Server), 12 SP2-LTSS-ERICSSON (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-LTSS-SAP (SUSE Linux Enterprise Server for SAP Applications), \u0434\u043e 78.10 (Thunderbird), \u0434\u043e 88 (Firefox), \u0434\u043e 78.10 (Firefox ESR), 16.04 ESM (Ubuntu), 15 SP3 (SUSE Linux Enterprise Module for Desktop Applications), 1.0 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 2.1 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Mozilla Corp.:\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-14/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-15/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-16/\n\n\u0414\u043b\u044f \u0420\u0415\u0414 \u041e\u0421:\nhttps://redos.red-soft.ru/updatesec/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2021-29945\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2021-29945/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2021-29945\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-4926-1\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f firefox-esr \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 78.13.0esr+repack-1~deb10u1.osnova2\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f thunderbird \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:91.13.0+repack-1~deb10u1.osnova1.strelets\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f firefox-esr \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 91.13.0esr+repack-1~deb10u1.osnova1.strelets\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "19.04.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.05.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-02284",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-29945",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Ubuntu, SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Server, SUSE OpenStack Cloud, SUSE Linux Enterprise Software Development Kit, SUSE Enterprise Storage, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), HPE Helion Openstack, SUSE Linux Enterprise High Performance Computing, SUSE Linux Enterprise Module for Open Buildservice Development Tools, SUSE Linux Enterprise Workstation Extension, OpenSUSE Leap, SUSE CaaS Platform, SUSE Linux Enterprise Module for Desktop Applications, SUSE Manager Proxy, SUSE Manager Retail Branch Server, SUSE Manager Server, Thunderbird, Firefox, Firefox ESR, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2-BCL , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3 , Red Hat Inc. Red Hat Enterprise Linux 8 , Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP1 , Novell Inc. Suse Linux Enterprise Server 11 SP4-LTSS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 11 SP4-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL , Novell Inc. Suse Linux Enterprise Server 12 SP5 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3-BCL , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3-LTSS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.2 \u041c\u0443\u0440\u043e\u043c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Novell Inc. Suse Linux Enterprise Server 12 SP3-ESPOS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3-ESPOS , Novell Inc. Suse Linux Enterprise Server 15-LTSS , Canonical Ltd. Ubuntu 20.04 LTS , Canonical Ltd. Ubuntu 20.10 , Novell Inc. OpenSUSE Leap 15.2 , Red Hat Inc. Red Hat Enterprise Linux 8.1 Extended Update Support , Novell Inc. Suse Linux Enterprise Server 12 SP4-ESPOS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4-LTSS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4-ESPOS , Red Hat Inc. Red Hat Enterprise Linux 8.2 Extended Update Support , Novell Inc. Suse Linux Enterprise Server 12 SP4-LTSS , Canonical Ltd. Ubuntu 21.04 , Novell Inc. Suse Linux Enterprise Server 15 SP1-BCL , Novell Inc. Suse Linux Enterprise Server 15 SP1-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS-ERICSSON , Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS-SAP , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS-ERICSSON , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS-SAP , Canonical Ltd. Ubuntu 16.04 ESM , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 JIT WebAssembly \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird, \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Firefox \u0438 Firefox ESR, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u044b\u0435 \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u044f (CWE-682)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 JIT WebAssembly \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird, \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Firefox \u0438 Firefox ESR \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c\u0438 \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u044f\u043c\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/security/cve/CVE-2021-29945\nhttps://redos.red-soft.ru/updatesec/\nhttps://security-tracker.debian.org/tracker/CVE-2021-29945\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie\nhttps://ubuntu.com/security/notices/USN-4926-1\nhttps://www.cybersecurity-help.cz/vdb/SB2021041920\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-14/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-15/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-16/\nhttps://www.suse.com/security/cve/CVE-2021-29945/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.1/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-682",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,6)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,1)"
}
CNVD-2021-39257
Vulnerability from cnvd - Published: 2021-06-03厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/en-US/security/advisories/mfsa2021-16/
| Name | Mozilla Firefox |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-29945"
}
},
"description": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\n\nMozilla Firefox\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u5bfc\u81f4\u6d4f\u89c8\u5668\u5d29\u6e83\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-16/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-39257",
"openTime": "2021-06-03",
"patchDescription": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\r\n\r\nMozilla Firefox\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u5bfc\u81f4\u6d4f\u89c8\u5668\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2021-39257\uff09\u7684\u8865\u4e01",
"products": {
"product": "Mozilla Firefox"
},
"referenceLink": "https://exchange.xforce.ibmcloud.com/vulnerabilities/200195",
"serverity": "\u9ad8",
"submitTime": "2021-04-21",
"title": "Mozilla Firefox\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2021-39257\uff09"
}
FKIE_CVE-2021-29945
Vulnerability from fkie_nvd - Published: 2021-06-24 14:15 - Updated: 2024-11-21 06:02| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1700690 | Issue Tracking, Permissions Required, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2021-14/ | Release Notes, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2021-15/ | Release Notes, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2021-16/ | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1700690 | Issue Tracking, Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2021-14/ | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2021-15/ | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2021-16/ | Release Notes, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "93A024F9-E2A3-4F13-83A3-879EAC032592",
"versionEndExcluding": "88.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "504327C0-E11F-4EAC-9ED3-8BEA4C40DD0C",
"versionEndExcluding": "78.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "65A9C7EC-D89C-4C03-841E-9DFED53E5795",
"versionEndExcluding": "78.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88."
},
{
"lang": "es",
"value": "El JIT de WebAssembly pod\u00eda calcular mal el tama\u00f1o de un tipo de retorno, lo que pod\u00eda conllevar a una lectura nula y resultar en un bloqueo. *Nota: Este problema s\u00f3lo afectaba a las plataformas x86-32. Otras plataformas no est\u00e1n afectadas. Esta vulnerabilidad afecta a Firefox ESR versiones anteriores a 78.10, Thunderbird versiones anteriores a 78.10 y Firefox versiones anteriores a 88"
}
],
"id": "CVE-2021-29945",
"lastModified": "2024-11-21T06:02:02.030",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-24T14:15:09.763",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
},
{
"source": "security@mozilla.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"source": "security@mozilla.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"source": "security@mozilla.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-682"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-79CG-JG39-89HQ
Vulnerability from github – Published: 2022-05-24 19:06 – Updated: 2022-05-24 19:06The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. Note: This issue only affected x86-32 platforms. Other platforms are unaffected.. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
{
"affected": [],
"aliases": [
"CVE-2021-29945"
],
"database_specific": {
"cwe_ids": [
"CWE-682"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-06-24T14:15:00Z",
"severity": "MODERATE"
},
"details": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"id": "GHSA-79cg-jg39-89hq",
"modified": "2022-05-24T19:06:10Z",
"published": "2022-05-24T19:06:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29945"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2021-29945
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-29945",
"description": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"id": "GSD-2021-29945",
"references": [
"https://www.suse.com/security/cve/CVE-2021-29945.html",
"https://www.debian.org/security/2021/dsa-4897",
"https://www.debian.org/security/2021/dsa-4895",
"https://access.redhat.com/errata/RHSA-2021:1363",
"https://access.redhat.com/errata/RHSA-2021:1362",
"https://access.redhat.com/errata/RHSA-2021:1361",
"https://access.redhat.com/errata/RHSA-2021:1360",
"https://access.redhat.com/errata/RHSA-2021:1353",
"https://access.redhat.com/errata/RHSA-2021:1352",
"https://access.redhat.com/errata/RHSA-2021:1351",
"https://access.redhat.com/errata/RHSA-2021:1350",
"https://ubuntu.com/security/CVE-2021-29945",
"https://advisories.mageia.org/CVE-2021-29945.html",
"https://security.archlinux.org/CVE-2021-29945",
"https://linux.oracle.com/cve/CVE-2021-29945.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-29945"
],
"details": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"id": "GSD-2021-29945",
"modified": "2023-12-13T01:23:37.008456Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2021-29945",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "78.10"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "78.10"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "88"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect size computation in WebAssembly JIT could lead to null-reads"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-14/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-16/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-15/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2021-29945"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "88"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "78.10"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "78.10"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash.\n\u003cbr\u003e*Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox \u003c 88, Firefox ESR \u003c 78.10, and Thunderbird \u003c 78.10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect size computation in WebAssembly JIT could lead to null-reads"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*",
"cpe_name": [],
"versionEndExcluding": "88.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*",
"cpe_name": [],
"versionEndExcluding": "78.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*",
"cpe_name": [],
"versionEndExcluding": "78.10",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2021-29945"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-682"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1700690"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-15/",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-15/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-16/",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-16/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2021-14/",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2021-14/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-06-30T19:01Z",
"publishedDate": "2021-06-24T14:15Z"
}
}
}
OPENSUSE-SU-2021:0621-1
Vulnerability from csaf_opensuse - Published: 2021-04-26 14:17 - Updated: 2021-04-26 14:17| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaFirefox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaFirefox fixes the following issues:\n\n- Firefox was updated to 78.10.0 ESR (bsc#1184960)\n * CVE-2021-23994: Out of bound write due to lazy initialization\n * CVE-2021-23995: Use-after-free in Responsive Design Mode\n * CVE-2021-23998: Secure Lock icon could have been spoofed\n * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage\n * CVE-2021-23999: Blob URLs may have been granted additional privileges\n * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL\n * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads\n * CVE-2021-29946: Port blocking could be bypassed\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-621",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0621-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:0621-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:0621-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/"
},
{
"category": "self",
"summary": "SUSE Bug 1184960",
"url": "https://bugzilla.suse.com/1184960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23961 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23994 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23995 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23998 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23999 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-24002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-24002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29945 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29946 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29946/"
}
],
"title": "Security update for MozillaFirefox",
"tracking": {
"current_release_date": "2021-04-26T14:17:06Z",
"generator": {
"date": "2021-04-26T14:17:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:0621-1",
"initial_release_date": "2021-04-26T14:17:06Z",
"revision_history": [
{
"date": "2021-04-26T14:17:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"product": {
"name": "MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"product_id": "MozillaFirefox-78.10.0-lp152.2.55.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"product": {
"name": "MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"product_id": "MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"product_id": "MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"product_id": "MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64",
"product_id": "MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-78.10.0-lp152.2.55.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64"
},
"product_reference": "MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64"
},
"product_reference": "MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-23961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23961"
}
],
"notes": [
{
"category": "general",
"text": "Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network\u0027s hosts as well as services running on the user\u0027s local machine. This vulnerability affects Firefox \u003c 85.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23961",
"url": "https://www.suse.com/security/cve/CVE-2021-23961"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-23961",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-23961"
},
{
"cve": "CVE-2021-23994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23994"
}
],
"notes": [
{
"category": "general",
"text": "A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23994",
"url": "https://www.suse.com/security/cve/CVE-2021-23994"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-23994",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-23994"
},
{
"cve": "CVE-2021-23995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23995"
}
],
"notes": [
{
"category": "general",
"text": "When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23995",
"url": "https://www.suse.com/security/cve/CVE-2021-23995"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-23995",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-23995"
},
{
"cve": "CVE-2021-23998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23998"
}
],
"notes": [
{
"category": "general",
"text": "Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23998",
"url": "https://www.suse.com/security/cve/CVE-2021-23998"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-23998",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-23998"
},
{
"cve": "CVE-2021-23999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23999"
}
],
"notes": [
{
"category": "general",
"text": "If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23999",
"url": "https://www.suse.com/security/cve/CVE-2021-23999"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-23999",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-23999"
},
{
"cve": "CVE-2021-24002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-24002"
}
],
"notes": [
{
"category": "general",
"text": "When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-24002",
"url": "https://www.suse.com/security/cve/CVE-2021-24002"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-24002",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-24002"
},
{
"cve": "CVE-2021-29945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29945"
}
],
"notes": [
{
"category": "general",
"text": "The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29945",
"url": "https://www.suse.com/security/cve/CVE-2021-29945"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-29945",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-29945"
},
{
"cve": "CVE-2021-29946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29946"
}
],
"notes": [
{
"category": "general",
"text": "Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR \u003c 78.10, Thunderbird \u003c 78.10, and Firefox \u003c 88.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29946",
"url": "https://www.suse.com/security/cve/CVE-2021-29946"
},
{
"category": "external",
"summary": "SUSE Bug 1184960 for CVE-2021-29946",
"url": "https://bugzilla.suse.com/1184960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:MozillaFirefox-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-devel-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-common-78.10.0-lp152.2.55.1.x86_64",
"openSUSE Leap 15.2:MozillaFirefox-translations-other-78.10.0-lp152.2.55.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-04-26T14:17:06Z",
"details": "important"
}
],
"title": "CVE-2021-29946"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.