ALT-PU-2021-2261-1
Closed vulnerabilities
BDU:2021-03659
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2021-03660
Уязвимость почтового клиента Mozilla Thunderbird, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-03661
Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-03891
Уязвимость браузера Mozilla Firefox для Android, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
BDU:2021-03900
Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-03950
Уязвимость реализации механизма HSTS (HTTP Strict Transport Security) браузера Mozilla Firefox, позволяющая нарушителю обойти механизмы защиты
BDU:2021-03951
Уязвимость браузера Mozilla Firefox, связанная с ошибками представления информации, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-04482
Уязвимость графической библиотеки Cairo браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-04517
Уязвимость функции автозаполнения пароля браузера Mozilla Firefox для Android, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2021-29970
A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird < 78.12, Firefox ESR < 78.12, and Firefox < 90.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1709976
- https://bugzilla.mozilla.org/show_bug.cgi?id=1709976
- GLSA-202202-03
- GLSA-202202-03
- GLSA-202208-14
- GLSA-202208-14
- https://www.mozilla.org/security/advisories/mfsa2021-28/
- https://www.mozilla.org/security/advisories/mfsa2021-28/
- https://www.mozilla.org/security/advisories/mfsa2021-29/
- https://www.mozilla.org/security/advisories/mfsa2021-29/
- https://www.mozilla.org/security/advisories/mfsa2021-30/
- https://www.mozilla.org/security/advisories/mfsa2021-30/
Modified: 2024-11-21
CVE-2021-29971
If a user had granted a permission to a webpage and saved that grant, any webpage running on the same host - irrespective of scheme or port - would be granted that permission. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90.
Modified: 2024-11-21
CVE-2021-29972
A use-after-free vulnerability was found via testing, and traced to an out-of-date Cairo library. Updating the library resolved the issue, and may have remediated other, unknown security vulnerabilities as well. This vulnerability affects Firefox < 90.
Modified: 2024-11-21
CVE-2021-29973
Password autofill was enabled without user interaction on insecure websites on Firefox for Android. This was corrected to require user interaction with the page before a user's password would be entered by the browser's autofill functionality *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90.
Modified: 2024-11-21
CVE-2021-29974
When network partitioning was enabled, e.g. as a result of Enhanced Tracking Protection settings, a TLS error page would allow the user to override an error on a domain which had specified HTTP Strict Transport Security (which implies that the error should not be override-able.) This issue did not affect the network connections, and they were correctly upgraded to HTTPS automatically. This vulnerability affects Firefox < 90.
Modified: 2024-11-21
CVE-2021-29975
Through a series of DOM manipulations, a message, over which the attacker had control of the text but not HTML or formatting, could be overlaid on top of another domain (with the new domain correctly shown in the address bar) resulting in possible user confusion. This vulnerability affects Firefox < 90.
Modified: 2024-11-21
CVE-2021-29976
Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.12, Firefox ESR < 78.12, and Firefox < 90.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1700895%2C1703334%2C1706910%2C1711576%2C1714391
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1700895%2C1703334%2C1706910%2C1711576%2C1714391
- GLSA-202202-03
- GLSA-202202-03
- GLSA-202208-14
- GLSA-202208-14
- https://www.mozilla.org/security/advisories/mfsa2021-28/
- https://www.mozilla.org/security/advisories/mfsa2021-28/
- https://www.mozilla.org/security/advisories/mfsa2021-29/
- https://www.mozilla.org/security/advisories/mfsa2021-29/
- https://www.mozilla.org/security/advisories/mfsa2021-30/
- https://www.mozilla.org/security/advisories/mfsa2021-30/
Modified: 2024-11-21
CVE-2021-29977
Mozilla developers reported memory safety bugs present in Firefox 89. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 90.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1665836%2C1686138%2C1704316%2C1706314%2C1709931%2C1712084%2C1712357%2C1714066
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1665836%2C1686138%2C1704316%2C1706314%2C1709931%2C1712084%2C1712357%2C1714066
- GLSA-202202-03
- GLSA-202202-03
- https://www.mozilla.org/security/advisories/mfsa2021-28/
- https://www.mozilla.org/security/advisories/mfsa2021-28/
Modified: 2024-11-21
CVE-2021-30547
Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html
- https://crbug.com/1210414
- https://crbug.com/1210414
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2709-1] firefox-esr security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2709-1] firefox-esr security update
- [debian-lts-announce] 20210719 [SECURITY] [DLA 2711-1] thunderbird security update
- [debian-lts-announce] 20210719 [SECURITY] [DLA 2711-1] thunderbird security update
- FEDORA-2021-ca58c57bdf
- FEDORA-2021-ca58c57bdf
- FEDORA-2021-f94dadff78
- FEDORA-2021-f94dadff78
- GLSA-202202-03
- GLSA-202202-03
- GLSA-202208-14
- GLSA-202208-14
- DSA-4939
- DSA-4939
- DSA-4940
- DSA-4940
Closed bugs
Значения макросов %firefox_*_extensionsdir не соответствует текущему firefox'у