ALT-BU-2021-3866-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-02279
Уязвимость компонента WebGL почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2021-02280
Уязвимость режима адаптивного дизайна (Responsive Design Mode) почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2021-02281
Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с ошибками при сохранении разрешений, позволяющая нарушителю ошибочно присвоить сертификат безопасности HTTP-странице
BDU:2021-02282
Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с ошибками наследуемых разрешений, позволяющая нарушителю повысить свои привилегии
BDU:2021-02283
Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с ошибками при обработке символов новой строки в URL-адресе FTP, позволяющая нарушителю отправлять произвольные команды на FTP-сервер
BDU:2021-02284
Уязвимость компонента JIT WebAssembly почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-02285
Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2021-23994
A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1699077
- https://bugzilla.mozilla.org/show_bug.cgi?id=1699077
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-23995
When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1699835
- https://bugzilla.mozilla.org/show_bug.cgi?id=1699835
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-23996
By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user. This vulnerability affects Firefox < 88.
Modified: 2024-11-21
CVE-2021-23997
Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88.
Modified: 2024-11-21
CVE-2021-23998
Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1667456
- https://bugzilla.mozilla.org/show_bug.cgi?id=1667456
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-23999
If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1691153
- https://bugzilla.mozilla.org/show_bug.cgi?id=1691153
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-24000
A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type="file">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to. This vulnerability affects Firefox < 88.
Modified: 2024-11-21
CVE-2021-24001
A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88.
Modified: 2024-11-21
CVE-2021-24002
When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1702374
- https://bugzilla.mozilla.org/show_bug.cgi?id=1702374
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-29944
Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 88.
Modified: 2024-11-21
CVE-2021-29945
The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1700690
- https://bugzilla.mozilla.org/show_bug.cgi?id=1700690
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-29946
Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1698503
- https://bugzilla.mozilla.org/show_bug.cgi?id=1698503
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-14/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-15/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Modified: 2024-11-21
CVE-2021-29947
Mozilla developers and community members reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1651449%2C1674142%2C1693476%2C1696886%2C1700091
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1651449%2C1674142%2C1693476%2C1696886%2C1700091
- https://www.mozilla.org/security/advisories/mfsa2021-16/
- https://www.mozilla.org/security/advisories/mfsa2021-16/
Closed vulnerabilities
BDU:2020-05262
Уязвимость системы обнаружения вторжений Snort микропрограммного обеспечения межсетевого экрана Cisco Firepower Threat Defense (FTD), программно-определяемой сети Cisco SD-WAN, межсетевой операционной системы Cisco IOS XE и микропрограммного обеспечения cетевых устройств Cisco Meraki, позволяющая нарушителю обойти механизм защиты и выполнить вредоносную нагрузку
BDU:2021-00416
Уязвимость расширения протокола TCP Fast Open (TFO) системы обнаружения вторжений Snort, позволяющая нарушителю обойти настроенную файловую политику для HTTP
BDU:2021-00435
Уязвимость механизма обнаружения приложений системы обнаружения вторжений Snort, позволяющая нарушителю повысить свои привилегии
BDU:2021-00473
Уязвимость системы обнаружения вторжений Snort, связанная с ошибками обработки HTTP-заголовков, позволяющая нарушителю обойти настроенную файловую политику для HTTP
Modified: 2024-11-21
CVE-2020-3299
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- 20201021 Multiple Cisco Products SNORT HTTP Detection Engine File Policy Bypass Vulnerability
- 20201021 Multiple Cisco Products SNORT HTTP Detection Engine File Policy Bypass Vulnerability
- DSA-5354
- DSA-5354
Modified: 2024-11-26
CVE-2021-1223
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- 20210113 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability
- 20210113 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability
- DSA-5354
- DSA-5354
Modified: 2024-11-26
CVE-2021-1224
Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- 20210113 Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability
- 20210113 Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability
- DSA-5354
- DSA-5354
Modified: 2024-11-26
CVE-2021-1236
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- [debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update
- 20210113 Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability
- 20210113 Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability
- DSA-5354
- DSA-5354
Closed vulnerabilities
BDU:2022-00208
Уязвимость программной объектной сети хранения ceph, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-20288
An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1938031
- https://bugzilla.redhat.com/show_bug.cgi?id=1938031
- [debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update
- [debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update
- FEDORA-2021-e29c1ee892
- FEDORA-2021-e29c1ee892
- FEDORA-2021-e65b9fb52e
- FEDORA-2021-e65b9fb52e
- FEDORA-2021-168fbed46f
- FEDORA-2021-168fbed46f
- GLSA-202105-39
- GLSA-202105-39