A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-10/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-12/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-11/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1692832 | issue tracking |