Bug 1951365 (CVE-2021-23995)

Summary: CVE-2021-23995 Mozilla: Use-after-free in Responsive Design Mode
Product: [Other] Security Response Reporter: Doran Moppert <dmoppert>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: erack, jhorak, nobody, stransky, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 78.10, thunderbird 78.10 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-04-26 10:47:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1951356, 1951357, 1951358, 1951359, 1951360, 1951361, 1951375, 1951376, 1951377, 1951378, 1951379, 1951380    
Bug Blocks: 1951230    

Description Doran Moppert 2021-04-20 02:52:58 UTC
When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code.



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2021-15/#CVE-2021-23995

Comment 1 Doran Moppert 2021-04-20 02:53:02 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Irvan Kurniawan

Comment 2 errata-xmlrpc 2021-04-26 05:46:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1353 https://access.redhat.com/errata/RHSA-2021:1353

Comment 3 errata-xmlrpc 2021-04-26 05:48:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:1351 https://access.redhat.com/errata/RHSA-2021:1351

Comment 4 errata-xmlrpc 2021-04-26 06:00:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:1352 https://access.redhat.com/errata/RHSA-2021:1352

Comment 5 errata-xmlrpc 2021-04-26 06:16:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:1350 https://access.redhat.com/errata/RHSA-2021:1350

Comment 6 Product Security DevOps Team 2021-04-26 10:47:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-23995

Comment 7 errata-xmlrpc 2021-04-26 11:14:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:1362 https://access.redhat.com/errata/RHSA-2021:1362

Comment 8 errata-xmlrpc 2021-04-26 11:16:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1360 https://access.redhat.com/errata/RHSA-2021:1360

Comment 9 errata-xmlrpc 2021-04-26 11:31:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:1361 https://access.redhat.com/errata/RHSA-2021:1361

Comment 10 errata-xmlrpc 2021-04-26 11:49:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:1363 https://access.redhat.com/errata/RHSA-2021:1363