A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2021-11/#CVE-2021-23981
Acknowledgments: Name: the Mozilla project Upstream: Abraruddin Khan and Omair
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0990 https://access.redhat.com/errata/RHSA-2021:0990
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0991 https://access.redhat.com/errata/RHSA-2021:0991
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0995 https://access.redhat.com/errata/RHSA-2021:0995
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0993 https://access.redhat.com/errata/RHSA-2021:0993
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0989 https://access.redhat.com/errata/RHSA-2021:0989
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0994 https://access.redhat.com/errata/RHSA-2021:0994
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0996 https://access.redhat.com/errata/RHSA-2021:0996
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0992 https://access.redhat.com/errata/RHSA-2021:0992
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23981