QID 352834

Date Published: 2021-09-20

QID 352834: Amazon Linux Security Advisory for thunderbird: ALAS2-2021-1709

If thunderbird was configured to use starttls for an imap connection, and an attacker injected imap server responses prior to the completion of the starttls handshake, then thunderbird didn't ignore the injected data.
This could have resulted in thunderbird showing incorrect information, for example the attacker could have tricked thunderbird to show folders that didn't exist on the imap server.
This vulnerability affects thunderbird < 78.12. (
( CVE-2021-29969) a malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *
This bug could only be triggered when accessibility was enabled.*.
This vulnerability affects thunderbird < 78.12, firefox esr < 78.12, and firefox < 90. (
( CVE-2021-29970) mozilla developers reported memory safety bugs present in code shared between firefox and thunderbird.
Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
( CVE-2021-29976) uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash.
This vulnerability affects thunderbird < 78.13, thunderbird < 91, firefox esr < 78.13, and firefox < 91. (
( CVE-2021-29980) instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection.
This led to memory corruption and a potentially exploitable crash.
( CVE-2021-29984) a use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash.
( CVE-2021-29985) a suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *
Note: this issue only affected linux operating systems.
Other operating systems are unaffected.*
( CVE-2021-29986) firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash.
( CVE-2021-29988) mozilla developers reported memory safety bugs present in firefox 90 and firefox esr 78.12.
This vulnerability affects thunderbird < 78.13, firefox esr < 78.13, and firefox < 91. (
( CVE-2021-29989) out of bounds write in angle in google chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted html page. (
( CVE-2021-30547)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2021-1709 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2021-1709 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2021-1709.html