Bug 1951370 (CVE-2021-29945)

Summary: CVE-2021-29945 Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads
Product: [Other] Security Response Reporter: Doran Moppert <dmoppert>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: erack, jhorak, nobody, stransky, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 78.10, thunderbird 78.10 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-04-26 10:47:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1951356, 1951357, 1951358, 1951359, 1951360, 1951361, 1951375, 1951376, 1951377, 1951378, 1951379, 1951380    
Bug Blocks: 1951230    

Description Doran Moppert 2021-04-20 02:53:46 UTC
The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash.


*Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2021-15/#CVE-2021-29945

Comment 1 Doran Moppert 2021-04-20 02:53:50 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Christian Holler

Comment 2 errata-xmlrpc 2021-04-26 05:46:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1353 https://access.redhat.com/errata/RHSA-2021:1353

Comment 3 errata-xmlrpc 2021-04-26 05:48:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:1351 https://access.redhat.com/errata/RHSA-2021:1351

Comment 4 errata-xmlrpc 2021-04-26 06:00:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:1352 https://access.redhat.com/errata/RHSA-2021:1352

Comment 5 errata-xmlrpc 2021-04-26 06:16:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:1350 https://access.redhat.com/errata/RHSA-2021:1350

Comment 6 Product Security DevOps Team 2021-04-26 10:47:59 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-29945

Comment 7 errata-xmlrpc 2021-04-26 11:14:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:1362 https://access.redhat.com/errata/RHSA-2021:1362

Comment 8 errata-xmlrpc 2021-04-26 11:16:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1360 https://access.redhat.com/errata/RHSA-2021:1360

Comment 9 errata-xmlrpc 2021-04-26 11:31:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:1361 https://access.redhat.com/errata/RHSA-2021:1361

Comment 10 errata-xmlrpc 2021-04-26 11:49:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:1363 https://access.redhat.com/errata/RHSA-2021:1363