Vulnerability CVE-2021-29991: Information
Description
Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox < 91.0.1 and Thunderbird < 91.0.1.
Severity: HIGH (8.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
firefox | sisyphus | 91.0.1-alt1 | 125.0.2-alt1 | ALT-PU-2021-2576-1 | 283309 | Fixed |
firefox | p10 | 92.0-alt1 | 118.0.2-alt0.p10.1 | ALT-PU-2021-2849-1 | 284964 | Fixed |
firefox | p9 | 93.0-alt0.p9.1 | 105.0.1-alt0.c9.1 | ALT-PU-2022-1782-1 | 288073 | Fixed |
firefox | c10f1 | 92.0-alt1 | 112.0.2-alt0.p10.1 | ALT-PU-2021-2849-1 | 284964 | Fixed |
firefox | c9f2 | 93.0-alt0.p9.1 | 105.0.1-alt0.c9.1 | ALT-PU-2021-3368-1 | 288792 | Fixed |
firefox-esr | sisyphus | 91.0.1-alt1 | 115.10.0-alt1 | ALT-PU-2021-2725-1 | 284617 | Fixed |
firefox-esr | p10 | 91.1.0-alt1 | 115.10.0-alt1 | ALT-PU-2021-2881-1 | 284980 | Fixed |
firefox-esr | p9 | 91.7.0-alt0.p9.1 | 102.11.0-alt0.c9.1 | ALT-PU-2022-1781-1 | 288073 | Fixed |
firefox-esr | c10f1 | 91.1.0-alt1 | 115.9.1-alt0.c10.1 | ALT-PU-2021-2881-1 | 284980 | Fixed |
firefox-esr | c9f2 | 91.3.0-alt1.c9.1 | 102.12.0-alt0.c9.1 | ALT-PU-2021-3369-1 | 288792 | Fixed |
thunderbird | sisyphus | 91.0.2-alt1 | 115.9.0-alt1 | ALT-PU-2021-2636-1 | 283729 | Fixed |
thunderbird | p10 | 91.0.3-alt1 | 115.9.0-alt1 | ALT-PU-2021-2718-1 | 283946 | Fixed |
thunderbird | p9 | 91.6.0-alt0.p9.1 | 102.11.0-alt0.c9.1 | ALT-PU-2022-1783-1 | 288073 | Fixed |
thunderbird | c10f1 | 91.0.3-alt1 | 115.9.0-alt0.c10.1 | ALT-PU-2021-2718-1 | 283946 | Fixed |
thunderbird | c9f2 | 91.3.0-alt0.c9.1 | 102.11.0-alt0.c9.1 | ALT-PU-2021-3370-1 | 288792 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1724896 |
|
https://www.mozilla.org/security/advisories/mfsa2021-37/ |
|