Bug 1861572 (CVE-2020-15659)
Summary: | CVE-2020-15659 Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Doran Moppert <dmoppert> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | cschalle, gecko-bugs-nobody, jhorak, stransky |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | firefox 68.11, thunderbird 78.1, thunderbird 68.11 | Doc Type: | If docs needed, set a value |
Doc Text: |
The Mozilla Foundation Security Advisory describes this flaw as:
Mozilla developers Jason Kratzer and Luke Wagner reported memory safety bugs present in Firefox 78 and Firefox ESR 68.01. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-07-30 01:27:47 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1860968, 1860969, 1860970, 1860971, 1860972, 1860973, 1860974, 1861034, 1861035, 1861036, 1861037, 1861038, 1861039, 1861040 | ||
Bug Blocks: | 1860966 |
Description
Doran Moppert
2020-07-29 01:14:44 UTC
Acknowledgments: Name: the Mozilla project Upstream: Mozilla developers and community This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:3229 https://access.redhat.com/errata/RHSA-2020:3229 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:3233 https://access.redhat.com/errata/RHSA-2020:3233 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15659 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15659 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:3241 https://access.redhat.com/errata/RHSA-2020:3241 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:3254 https://access.redhat.com/errata/RHSA-2020:3254 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3253 https://access.redhat.com/errata/RHSA-2020:3253 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:3343 https://access.redhat.com/errata/RHSA-2020:3343 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:3342 https://access.redhat.com/errata/RHSA-2020:3342 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:3341 https://access.redhat.com/errata/RHSA-2020:3341 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3344 https://access.redhat.com/errata/RHSA-2020:3344 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:3345 https://access.redhat.com/errata/RHSA-2020:3345 |