Bug 1951365 (CVE-2021-23995) - CVE-2021-23995 Mozilla: Use-after-free in Responsive Design Mode
Summary: CVE-2021-23995 Mozilla: Use-after-free in Responsive Design Mode
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-23995
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1951356 1951357 1951358 1951359 1951360 1951361 1951375 1951376 1951377 1951378 1951379 1951380
Blocks: 1951230
TreeView+ depends on / blocked
 
Reported: 2021-04-20 02:52 UTC by Doran Moppert
Modified: 2021-10-05 06:55 UTC (History)
5 users (show)

Fixed In Version: firefox 78.10, thunderbird 78.10
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-04-26 10:47:29 UTC


Attachments (Terms of Use)

Description Doran Moppert 2021-04-20 02:52:58 UTC
When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code.



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2021-15/#CVE-2021-23995

Comment 1 Doran Moppert 2021-04-20 02:53:02 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Irvan Kurniawan

Comment 2 errata-xmlrpc 2021-04-26 05:46:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1353 https://access.redhat.com/errata/RHSA-2021:1353

Comment 3 errata-xmlrpc 2021-04-26 05:48:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:1351 https://access.redhat.com/errata/RHSA-2021:1351

Comment 4 errata-xmlrpc 2021-04-26 06:00:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:1352 https://access.redhat.com/errata/RHSA-2021:1352

Comment 5 errata-xmlrpc 2021-04-26 06:16:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:1350 https://access.redhat.com/errata/RHSA-2021:1350

Comment 6 Product Security DevOps Team 2021-04-26 10:47:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-23995

Comment 7 errata-xmlrpc 2021-04-26 11:14:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:1362 https://access.redhat.com/errata/RHSA-2021:1362

Comment 8 errata-xmlrpc 2021-04-26 11:16:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1360 https://access.redhat.com/errata/RHSA-2021:1360

Comment 9 errata-xmlrpc 2021-04-26 11:31:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:1361 https://access.redhat.com/errata/RHSA-2021:1361

Comment 10 errata-xmlrpc 2021-04-26 11:49:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:1363 https://access.redhat.com/errata/RHSA-2021:1363


Note You need to log in before you can comment on or make changes to this bug.