A use-after-free could have occured when an HTTP2 session object was released on a different thread, leading to memory corruption and a potentially exploitable crash. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#MOZ-2021-0008
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:4116 https://access.redhat.com/errata/RHSA-2021:4116
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4123 https://access.redhat.com/errata/RHSA-2021:4123
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:4133 https://access.redhat.com/errata/RHSA-2021:4133
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:4132 https://access.redhat.com/errata/RHSA-2021:4132
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4130 https://access.redhat.com/errata/RHSA-2021:4130
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:4134 https://access.redhat.com/errata/RHSA-2021:4134
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:4607 https://access.redhat.com/errata/RHSA-2021:4607
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:4605 https://access.redhat.com/errata/RHSA-2021:4605