Bug 1257276 (CVE-2015-4497) - CVE-2015-4497 Mozilla: Use-after-free when resizing canvas element during restyling (MFSA 2015-94)
Summary: CVE-2015-4497 Mozilla: Use-after-free when resizing canvas element during res...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-4497
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1257106
TreeView+ depends on / blocked
 
Reported: 2015-08-26 15:52 UTC by Huzaifa S. Sidhpurwala
Modified: 2023-05-12 10:30 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2015-08-28 04:50:08 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1693 0 normal SHIPPED_LIVE Critical: firefox security update 2015-08-28 01:18:01 UTC

Description Huzaifa S. Sidhpurwala 2015-08-26 15:52:18 UTC
Mozilla community member Jean-Max Reymond discovered a use-after-free vulnerability with a <canvas> element on a page. This occurs when a resize event is triggered in concert with style changes but the canvas references have been recreated in the meantime, destroying the originally referenced context. This results in an exploitable crash.

Ucha Gobejishvili, working with HP's Zero Day Initiative, subsequently reported this same issue.


External Reference:

https://www.mozilla.org/security/announce/2015/mfsa2015-94.html


Acknowledgements:

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Jean-Max Reymond and Ucha Gobejishvili as the original reporter.

Comment 1 errata-xmlrpc 2015-08-27 21:18:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2015:1693 https://rhn.redhat.com/errata/RHSA-2015-1693.html


Note You need to log in before you can comment on or make changes to this bug.