A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1692832 | Issue Tracking |
https://www.mozilla.org/security/advisories/mfsa2021-10/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-11/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-12/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-03-31 14:15
Updated : 2022-05-03 16:04
NVD link : CVE-2021-23981
Mitre link : CVE-2021-23981
CVE.ORG link : CVE-2021-23981
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
- firefox_esr
CWE
CWE-787
Out-of-bounds Write