193 lines
8.9 KiB
JSON
193 lines
8.9 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20212248",
|
||
"Version": "oval:org.altlinux.errata:def:20212248",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-2248: package `thunderbird` update to version 78.12.0-alt0.c9.1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-2248",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2248",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03659",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03659",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03660",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03660",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03661",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03661",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03662",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03662",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29969",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29969",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29970",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29970",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30547",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30547",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades thunderbird to version 78.12.0-alt0.c9.1. \nSecurity Fix(es):\n\n * BDU:2021-03659: Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03660: Уязвимость почтового клиента Mozilla Thunderbird, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03661: Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-03662: Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2021-29969: If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird \u003c 78.12.\n\n * CVE-2021-29970: A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird \u003c 78.12, Firefox ESR \u003c 78.12, and Firefox \u003c 90.\n\n * CVE-2021-29976: Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 78.12, Firefox ESR \u003c 78.12, and Firefox \u003c 90.\n\n * CVE-2021-30547: Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-07-15"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-07-15"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-03659",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03659",
|
||
"Impact": "High",
|
||
"Public": "20210713"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03660",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03660",
|
||
"Impact": "High",
|
||
"Public": "20210713"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03661",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03661",
|
||
"Impact": "High",
|
||
"Public": "20210713"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03662",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
|
||
"CWE": "CWE-77",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03662",
|
||
"Impact": "Low",
|
||
"Public": "20210713"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2021-29969",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-552",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29969",
|
||
"Impact": "Low",
|
||
"Public": "20210805"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29970",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29970",
|
||
"Impact": "High",
|
||
"Public": "20210805"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29976",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29976",
|
||
"Impact": "High",
|
||
"Public": "20210805"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30547",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30547",
|
||
"Impact": "High",
|
||
"Public": "20210615"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212248001",
|
||
"Comment": "rpm-build-thunderbird is earlier than 0:78.12.0-alt0.c9.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212248002",
|
||
"Comment": "thunderbird is earlier than 0:78.12.0-alt0.c9.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212248003",
|
||
"Comment": "thunderbird-wayland is earlier than 0:78.12.0-alt0.c9.1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |