一、漏洞信息
漏洞编号:CVE-2021-29946
漏洞归属组件:firefox
漏洞归属的版本:62.0.3,79.0
CVSS V3.0分值:
BaseScore:8.8 High
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞简述:
Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
漏洞公开时间:2021-06-24 22:15
漏洞创建时间:2021-09-26 03:44:17
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2021-29946
漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:
无
二、漏洞分析结构反馈
影响性分析说明:
Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
openEuler评分:
8.8
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.master(115.9.0):不受影响
2.openEuler-20.03-LTS-SP4(79.0):不受影响
3.openEuler-22.03-LTS-SP1(102.15.0):不受影响
4.openEuler-22.03-LTS-SP3(102.15.0):不受影响
5.openEuler-22.03-LTS-SP4(102.15.0):不受影响
6.openEuler-24.03-LTS(115.9.0):不受影响
7.openEuler-24.03-LTS-Next(115.9.0):不受影响
修复是否涉及abi变化(是/否):
1.master(115.9.0):否
2.openEuler-20.03-LTS-SP4(79.0):否
3.openEuler-22.03-LTS-SP1(102.15.0):否
4.openEuler-22.03-LTS-SP3(102.15.0):否
5.openEuler-22.03-LTS-SP4(102.15.0):否
6.openEuler-24.03-LTS(115.9.0):否
7.openEuler-24.03-LTS-Next(115.9.0):否
原因说明:
1.master(115.9.0):
2.openEuler-20.03-LTS-SP4(79.0):
3.openEuler-22.03-LTS-SP1(102.15.0):
4.openEuler-22.03-LTS-SP3(102.15.0):
5.openEuler-22.03-LTS-SP4(102.15.0):
6.openEuler-24.03-LTS(115.9.0):
7.openEuler-24.03-LTS-Next(115.9.0):
@dogsheng ,@miao_kaibo ,@AlexZ11 ,@small_leek ,@jimmy_hero ,@zhuchunyi
issue处理注意事项:
1. 当前issue受影响的分支提交pr时, 须在pr描述中填写当前issue编号进行关联, 否则无法关闭当前issue;
2. 模板内容需要填写完整, 无论是受影响或者不受影响都需要填写完整内容,未引入的分支不需要填写, 否则无法关闭当前issue;
3. 以下为模板中需要填写完整的内容, 请复制到评论区回复, 注: 内容的标题名称(影响性分析说明, openEuler评分, 受影响版本排查(受影响/不受影响), 修复是否涉及abi变化(是/否))不能省略,省略后cve-manager将无法正常解析填写内容.
影响性分析说明:
openEuler评分: (评分和向量)
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS(62.0.3):
2.openEuler-20.03-LTS-SP1:
3.openEuler-20.03-LTS-SP2:
修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS(62.0.3):
2.openEuler-20.03-LTS-SP1:
3.openEuler-20.03-LTS-SP2:
issue处理具体操作请参考:
https://gitee.com/openeuler/cve-manager/blob/master/doc/md/manual.md
pr关联issue具体操作请参考:
https://gitee.com/help/articles/4142
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。
Hi openeuler-ci-bot, welcome to the openEuler Community.
I'm the Bot here serving you. You can find the instructions on how to interact with me at
https://gitee.com/openeuler/community/blob/master/en/sig-infrastructure/command.md.
If you have any questions, please contact the SIG: Application, and any of the maintainers: @dogsheng, @jimmy_hero, @zhuchunyi, @AlexZ11, @wx897463, @miao_kaibo, @small_leek.
[Find-Patch] 抱歉,当前工具暂未找到推荐补丁,请人工查找或者之后再尝试。
若您人工查找到补丁,烦请以 (查找平台:xxx 补丁链接:xxx) 的形式添加评论,我们将持续改进工具,不胜感激!
需升级解决,已备案遗留,暂时挂起
根据NVD的描述,此漏洞影响的版本为firefox<88,master,21.09,SP1,SP2,21.03,Next分支版本为79.0,20.03LTS分支版本为62.0.3,需升级解决,已备案遗留,暂时挂起
@cherry530 请确认分支: openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 受影响/不受影响.
请确认分支信息是否填写完整,否则将无法关闭当前issue.
影响性分析说明:
Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(79.0): 受影响
2.openEuler-20.03-LTS-SP3(79.0): 受影响
3.openEuler-22.03-LTS(79.0): 受影响
4.openEuler-22.03-LTS-SP1(79.0): 受影响
修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(79.0): 是
2.openEuler-20.03-LTS-SP3(79.0): 是
3.openEuler-22.03-LTS(79.0): 是
4.openEuler-22.03-LTS-SP1(79.0): 是
@small_leek 经过 cve-manager 解析, 已分析的内容如下表所示:
状态 | 需分析 | 内容 |
---|---|---|
已分析 | 1.影响性分析说明 | Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
已分析 | 2.openEulerScore | 8.8 |
已分析 | 3.openEulerVector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
已分析 | 4.受影响版本排查 | openEuler-20.03-LTS-SP1:受影响,openEuler-20.03-LTS-SP3:受影响,openEuler-22.03-LTS:受影响,openEuler-22.03-LTS-SP1:受影响 |
已分析 | 5.修复是否涉及abi变化 | openEuler-20.03-LTS-SP1:是,openEuler-20.03-LTS-SP3:是,openEuler-22.03-LTS:是,openEuler-22.03-LTS-SP1:是 |
请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.
@jackssir 请确认分支: master,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-Next,openEuler-22.03-LTS-SP2,openEuler-22.03-LTS-SP3,openEuler-24.03-LTS,openEuler-24.03-LTS-Next 受影响/不受影响.
请确认分支信息是否填写完整,否则将无法关闭当前issue.
@openeuler-sync-bot 请确认分支: master,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-Next,openEuler-22.03-LTS-SP2,openEuler-22.03-LTS-SP3,openEuler-24.03-LTS,openEuler-24.03-LTS-Next 受影响/不受影响.
请确认分支信息是否填写完整,否则将无法关闭当前issue.
受影响版本排查(受影响/不受影响):
1.master:不受影响
2.openEuler-20.03-LTS-SP1:受影响
3.openEuler-20.03-LTS-SP4:受影响
4.openEuler-22.03-LTS:受影响
5.openEuler-22.03-LTS-Next:不受影响
6.openEuler-22.03-LTS-SP1:受影响
7.openEuler-22.03-LTS-SP2:不受影响
8.openEuler-22.03-LTS-SP3:不受影响
9.openEuler-24.03-LTS:不受影响
10.openEuler-24.03-LTS-Next:不受影响
修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP1:否
3.openEuler-20.03-LTS-SP4:否
4.openEuler-22.03-LTS:否
5.openEuler-22.03-LTS-Next:否
6.openEuler-22.03-LTS-SP1:否
7.openEuler-22.03-LTS-SP2:否
8.openEuler-22.03-LTS-SP3:否
9.openEuler-24.03-LTS:否
10.openEuler-24.03-LTS-Next:否
@small_leek 经过 cve-manager 解析, 已分析的内容如下表所示:
状态 | 需分析 | 内容 |
---|---|---|
已分析 | 1.影响性分析说明 | Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
已分析 | 2.openEulerScore | 8.8 |
已分析 | 3.openEulerVector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
已分析 | 4.受影响版本排查 | openEuler-20.03-LTS-SP1:受影响,openEuler-20.03-LTS-SP4:受影响,openEuler-22.03-LTS:受影响,openEuler-22.03-LTS-SP1:受影响,master:不受影响,openEuler-22.03-LTS-Next:不受影响,openEuler-22.03-LTS-SP2:不受影响,openEuler-22.03-LTS-SP3:不受影响,openEuler-24.03-LTS:不受影响,openEuler-24.03-LTS-Next:不受影响 |
已分析 | 5.修复是否涉及abi变化 | master:否,openEuler-20.03-LTS-SP1:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS:否,openEuler-22.03-LTS-Next:否,openEuler-22.03-LTS-SP1:否,openEuler-22.03-LTS-SP2:否,openEuler-22.03-LTS-SP3:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否 |
请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.
受影响版本排查(受影响/不受影响):
1.master: 不受影响
2.openEuler-20.03-LTS-SP4: 不受影响
3.openEuler-22.03-LTS-SP1: 不受影响
4.openEuler-22.03-LTS-SP3: 不受影响
5.openEuler-22.03-LTS-SP4: 不受影响
6.openEuler-24.03-LTS: 不受影响
7.openEuler-24.03-LTS-Next: 不受影响
修复是否涉及abi变化(是/否):
1.master: 否
2.openEuler-20.03-LTS-SP4: 否
3.openEuler-22.03-LTS-SP1: 否
4.openEuler-22.03-LTS-SP3: 否
5.openEuler-22.03-LTS-SP4: 否
6.openEuler-24.03-LTS: 否
7.openEuler-24.03-LTS-Next: 否
@small_leek 经过 cve-manager 解析, 已分析的内容如下表所示:
状态 | 分析项目 | 内容 |
---|---|---|
已分析 | 1.影响性分析说明 | Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
已分析 | 2.openEulerScore | 8.8 |
已分析 | 3.openEulerVector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
已分析 | 4.受影响版本排查 | master:不受影响,openEuler-20.03-LTS-SP4:不受影响,openEuler-22.03-LTS-SP1:不受影响,openEuler-22.03-LTS-SP3:不受影响,openEuler-22.03-LTS-SP4:不受影响,openEuler-24.03-LTS:不受影响,openEuler-24.03-LTS-Next:不受影响 |
已分析 | 5.是否涉及abi变化 | master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP1:否,openEuler-22.03-LTS-SP3:否,openEuler-22.03-LTS-SP4:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否 |
已分析 | 6.原因说明 |
请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.
原因说明:
1.master: 已修复
2.openEuler-20.03-LTS-SP4: 已修复
3.openEuler-22.03-LTS-SP1: 已修复
4.openEuler-22.03-LTS-SP3: 已修复
5.openEuler-22.03-LTS-SP4: 已修复
6.openEuler-24.03-LTS: 已修复
7.openEuler-24.03-LTS-Next: 已修复
@small_leek 经过 cve-manager 解析, 已分析的内容如下表所示:
状态 | 分析项目 | 内容 |
---|---|---|
已分析 | 1.影响性分析说明 | Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
已分析 | 2.openEulerScore | 8.8 |
已分析 | 3.openEulerVector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
已分析 | 4.受影响版本排查 | master:不受影响,openEuler-20.03-LTS-SP4:不受影响,openEuler-22.03-LTS-SP1:不受影响,openEuler-22.03-LTS-SP3:不受影响,openEuler-22.03-LTS-SP4:不受影响,openEuler-24.03-LTS:不受影响,openEuler-24.03-LTS-Next:不受影响 |
已分析 | 5.是否涉及abi变化 | master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP1:否,openEuler-22.03-LTS-SP3:否,openEuler-22.03-LTS-SP4:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否 |
已分析 | 6.原因说明 |
请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.
影响性分析说明:
Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
openEuler评分:
8.8
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.master(128.3.0):不受影响
2.openEuler-20.03-LTS-SP4(79.0):不受影响
3.openEuler-22.03-LTS-SP1(102.15.0):不受影响
4.openEuler-22.03-LTS-SP3(102.15.0):不受影响
5.openEuler-22.03-LTS-SP4(102.15.0):不受影响
6.openEuler-24.03-LTS(128.3.0):不受影响
7.openEuler-24.03-LTS-Next(128.3.0):不受影响
修复是否涉及abi变化(是/否):
1.master(128.3.0):否
2.openEuler-20.03-LTS-SP4(79.0):否
3.openEuler-22.03-LTS-SP1(102.15.0):否
4.openEuler-22.03-LTS-SP3(102.15.0):否
5.openEuler-22.03-LTS-SP4(102.15.0):否
6.openEuler-24.03-LTS(128.3.0):否
7.openEuler-24.03-LTS-Next(128.3.0):否
原因说明:
1.master(128.3.0): 已修复
2.openEuler-20.03-LTS-SP4(79.0): 已修复
3.openEuler-22.03-LTS-SP1(102.15.0): 已修复
4.openEuler-22.03-LTS-SP3(102.15.0): 已修复
5.openEuler-22.03-LTS-SP4(102.15.0): 已修复
6.openEuler-24.03-LTS(128.3.0): 已修复
7.openEuler-24.03-LTS-Next(128.3.0): 已修复
@small_leek 经过 cve-manager 解析, 已分析的内容如下表所示:
状态 | 分析项目 | 内容 |
---|---|---|
已分析 | 1.影响性分析说明 | Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
已分析 | 2.openEulerScore | 8.8 |
已分析 | 3.openEulerVector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
已分析 | 4.受影响版本排查 | master:不受影响,openEuler-20.03-LTS-SP4:不受影响,openEuler-22.03-LTS-SP1:不受影响,openEuler-22.03-LTS-SP3:不受影响,openEuler-22.03-LTS-SP4:不受影响,openEuler-24.03-LTS:不受影响,openEuler-24.03-LTS-Next:不受影响 |
已分析 | 5.是否涉及abi变化 | master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP1:否,openEuler-22.03-LTS-SP3:否,openEuler-22.03-LTS-SP4:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否 |
已分析 | 6.原因说明 |
请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.
登录 后才可以发表评论