Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2021-11/#CVE-2021-23982
Acknowledgments: Name: the Mozilla project Upstream: Samy Kamkar, Ben Seri, Gregory Vishnepolsky
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0990 https://access.redhat.com/errata/RHSA-2021:0990
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0991 https://access.redhat.com/errata/RHSA-2021:0991
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0995 https://access.redhat.com/errata/RHSA-2021:0995
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0993 https://access.redhat.com/errata/RHSA-2021:0993
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0989 https://access.redhat.com/errata/RHSA-2021:0989
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0994 https://access.redhat.com/errata/RHSA-2021:0994
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0996 https://access.redhat.com/errata/RHSA-2021:0996
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0992 https://access.redhat.com/errata/RHSA-2021:0992
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23982