Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1236956 - (CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737 CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66)
CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737 CVE-2015-2738 CVE-201...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
impact=critical,public=20150702,repor...
: Security
Depends On:
Blocks: 1235754
  Show dependency treegraph
 
Reported: 2015-06-30 01:13 EDT by Huzaifa S. Sidhpurwala
Modified: 2015-07-20 13:53 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-07-20 13:53:45 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1207 normal SHIPPED_LIVE Critical: firefox security update 2015-07-03 05:12:10 EDT
Red Hat Product Errata RHSA-2015:1455 normal SHIPPED_LIVE Important: thunderbird security update 2015-07-20 16:34:40 EDT

  None (edit)
Description Huzaifa S. Sidhpurwala 2015-06-30 01:13:37 EDT
Security researcher Ronald Crane reported seven vulnerabilities affecting released code that he found through code inspection. These included including three uses of uninitialized memory, one poor validation leading to an exploitable crash, one read of unowned memory in zip files, and two buffer overflows. These do not all have clear mechanisms to be exploited through web content but are vulnerable if a mechanism can be found to trigger them. 


External Reference:

http://www.mozilla.org/security/announce/2015/mfsa2015-66.html


Acknowledgements:

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane  as the original reporter.
Comment 1 errata-xmlrpc 2015-07-03 01:13:30 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2015:1207 https://rhn.redhat.com/errata/RHSA-2015-1207.html
Comment 2 errata-xmlrpc 2015-07-20 12:35:52 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 7

Via RHSA-2015:1455 https://rhn.redhat.com/errata/RHSA-2015-1455.html

Note You need to log in before you can comment on or make changes to this bug.