Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2021.0407
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2021-0407)
Resumen:The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2021-0407 advisory.
Descripción:Summary:
The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2021-0407 advisory.

Vulnerability Insight:
Updated thunderbird packages fix security vulnerabilities:

Uninitialized memory in a canvas object could have caused an incorrect
free() leading to memory corruption and a potentially exploitable crash
(CVE-2021-29980).

Instruction reordering during JIT optimization resulted in a sequence of
instructions that would cause an object to be incorrectly considered during
garbage collection. This led to memory corruption and a potentially
exploitable crash (CVE-2021-29984).

A use-after-free vulnerability in media channels could have led to memory
corruption and a potentially exploitable crash (CVE-2021-29985).

A suspected race condition when calling getaddrinfo while resolving DNS
names could have led to memory corruption and a potentially exploitable
crash (CVE-2021-29986).

Thunderbird incorrectly treated an inline list-item element as a block
element, resulting in an out of bounds read or memory corruption, and a
potentially exploitable crash (CVE-2021-29988).

Mozilla developers Christoph Kerschbaumer, Simon Giesecke, Sandor Molnar,
and Olli Pettay reported memory safety bugs present in Thunderbird ESR
78.12. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort some of these could have been exploited to
run arbitrary code (CVE-2021-29989).

Affected Software/OS:
'thunderbird, thunderbird-l10n' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-29980
https://security.gentoo.org/glsa/202202-03
https://security.gentoo.org/glsa/202208-14
https://bugzilla.mozilla.org/show_bug.cgi?id=1722204
https://www.mozilla.org/security/advisories/mfsa2021-33/
https://www.mozilla.org/security/advisories/mfsa2021-34/
https://www.mozilla.org/security/advisories/mfsa2021-35/
https://www.mozilla.org/security/advisories/mfsa2021-36/
Common Vulnerability Exposure (CVE) ID: CVE-2021-29984
https://bugzilla.mozilla.org/show_bug.cgi?id=1720031
Common Vulnerability Exposure (CVE) ID: CVE-2021-29985
https://bugzilla.mozilla.org/show_bug.cgi?id=1722083
Common Vulnerability Exposure (CVE) ID: CVE-2021-29986
https://bugzilla.mozilla.org/show_bug.cgi?id=1696138
Common Vulnerability Exposure (CVE) ID: CVE-2021-29988
https://bugzilla.mozilla.org/show_bug.cgi?id=1717922
Common Vulnerability Exposure (CVE) ID: CVE-2021-29989
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1662676%2C1666184%2C1719178%2C1719998%2C1720568
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.