CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
74.7%
Mozilla developers Tyson Smith and Gabriele Svelto reported memory safety bugs present in Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2021-38493). The firefox package has been updated to the 91ESR branch. See the upstream release notes for details.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | firefox | < 91.1.0-1 | firefox-91.1.0-1.mga8 |
Mageia | 8 | noarch | firefox-l10n | < 91.1.0-1 | firefox-l10n-91.1.0-1.mga8 |
Mageia | 8 | noarch | nss | < 3.70.0-1 | nss-3.70.0-1.mga8 |
bugs.mageia.org/show_bug.cgi?id=29373
firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html
firefox-source-docs.mozilla.org/security/nss/releases/nss_3_70.html
support.mozilla.org/kb/firefox-enterprise-91-release-notes
www.mozilla.org/en-US/firefox/91.0.1esr/releasenotes/
www.mozilla.org/en-US/firefox/91.0esr/releasenotes/
www.mozilla.org/en-US/security/advisories/mfsa2021-39/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
74.7%