{"id":"MGASA-2021-0403","summary":"Updated firefox packages fix security vulnerabilities","details":"Updated firefox packages fix security vulnerabilities:\n\nUninitialized memory in a canvas object could have caused an incorrect\nfree() leading to memory corruption and a potentially exploitable crash\n(CVE-2021-29980).\n\nInstruction reordering during JIT optimization resulted in a sequence of\ninstructions that would cause an object to be incorrectly considered during\ngarbage collection. This led to memory corruption and a potentially\nexploitable crash (CVE-2021-29984).\n\nA use-after-free vulnerability in media channels could have led to memory\ncorruption and a potentially exploitable crash (CVE-2021-29985).\n\nA suspected race condition when calling getaddrinfo while resolving DNS\nnames could have led to memory corruption and a potentially exploitable\ncrash (CVE-2021-29986).\n\nFirefox incorrectly treated an inline list-item element as a block element,\nresulting in an out of bounds read or memory corruption, and a potentially\nexploitable crash (CVE-2021-29988).\n\nMozilla developers Christoph Kerschbaumer, Simon Giesecke, Sandor Molnar,\nand Olli Pettay reported memory safety bugs present in Firefox ESR 78.12.\nSome of these bugs showed evidence of memory corruption and we presume that\nwith enough effort some of these could have been exploited to run arbitrary\ncode (CVE-2021-29989).\n","modified":"2026-02-04T04:28:43.637786Z","published":"2021-08-14T14:00:09Z","related":["CVE-2021-29980","CVE-2021-29984","CVE-2021-29985","CVE-2021-29986","CVE-2021-29988","CVE-2021-29989"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0403.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29346"},{"type":"REPORT","url":"https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/PsqVK-ngKHM"},{"type":"REPORT","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.69_release_notes"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-34/"}],"affected":[{"package":{"name":"firefox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"78.13.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0403.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"78.13.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0403.json"}},{"package":{"name":"nss","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.69.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0403.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}