Bug 1926979 (CVE-2020-16048)

Summary: CVE-2020-16048 Mozilla: Buffer overflow in depth pitch calculations for compressed textures
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: erack, jhorak, stransky, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: firefox 85.0.1, firefox 78.7.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-02-09 19:03:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 1925995    

Description msiddiqu 2021-02-09 19:02:32 UTC
In the Angle graphics library, depth pitch computations did not take into account the block size and simply multiplied the row pitch with the pixel height.  This caused the load functions to use a very high depth pitch, reading past the end of the user-supplied buffer.

Comment 1 msiddiqu 2021-02-09 19:02:36 UTC

Name: the Mozilla project
Upstream: Abraruddin Khan, Omair, Trend Micro Zero Day Initiative

Comment 2 msiddiqu 2021-02-09 19:03:28 UTC

This vulnerability only affected Firefox on the Windows operating system.  Firefox on Red Hat Enterprise Linux is not affected.