Name | CVE-2021-29982 |
Description | Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox < 91 and Thunderbird < 91. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
firefox (PTS) | sid | 131.0-1 | fixed |
thunderbird (PTS) | bullseye | 1:115.12.0-1~deb11u1 | fixed |
| bullseye (security) | 1:115.15.0-1~deb11u1 | fixed |
| bookworm | 1:115.12.0-1~deb12u1 | fixed |
| bookworm (security) | 1:115.15.0-1~deb12u1 | fixed |
| trixie | 1:128.2.0esr-1 | fixed |
| sid | 1:128.3.0esr-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
firefox | source | (unstable) | 91.0-1 | | | |
thunderbird | source | (unstable) | (not affected) | | | |
Notes
- thunderbird <not-affected> (Thunderbird 78.x not affected, only TB91)
https://www.mozilla.org/en-US/security/advisories/mfsa2021-33/#CVE-2021-29982
https://www.mozilla.org/en-US/security/advisories/mfsa2021-36/#CVE-2021-29982