Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-52/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1739683 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-54/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-53/ | Vendor Advisory |
https://www.debian.org/security/2021/dsa-5026 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5034 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202202-03 | Third Party Advisory |
https://security.gentoo.org/glsa/202208-14 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-12-08 14:15
Updated : 2022-12-09 07:55
NVD link : CVE-2021-43539
Mitre link : CVE-2021-43539
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
mozilla
- firefox
- firefox_esr
- thunderbird
debian
- debian_linux