Bug 1306496 - Mozilla: Vulnerabilities in Graphite 2 (MFSA 2016-14)
Summary: Mozilla: Vulnerabilities in Graphite 2 (MFSA 2016-14)
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1306497 1306498 1306499 1306500 1306501
Blocks: 1308507
TreeView+ depends on / blocked
 
Reported: 2016-02-11 02:26 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-02-17 04:21 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2016-02-19 04:06:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0197 0 normal SHIPPED_LIVE Critical: firefox security update 2016-02-16 15:37:09 UTC

Description Huzaifa S. Sidhpurwala 2016-02-11 02:26:49 UTC
Security researcher Holger Fuhrmannek reported that a malicious Graphite "smart font" could circumvent the validation of internal instruction parameters in the Graphite 2 library using special CNTXT_ITEM instructions. This could result in arbitrary code execution. This issue affected Graphite 2 version 1.2.4, which was used in the Firefox ESR branch. To address this issue and other security vulnerabilities recently disclosed by Cisco Talos affecting this version of the library, Firefox ESR has been updated to version 1.3.5, the same one used in Firefox 44. 


External Reference:

https://www.mozilla.org/security/announce/2016/mfsa2016-14.html

Comment 2 errata-xmlrpc 2016-02-16 10:41:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2016:0197 https://rhn.redhat.com/errata/RHSA-2016-0197.html

Comment 3 Huzaifa S. Sidhpurwala 2016-02-19 04:05:33 UTC
This issue has been addressed in thunderbird via the following security advisory:

https://rhn.redhat.com/errata/RHSA-2016-0258.html


Note You need to log in before you can comment on or make changes to this bug.