Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1330274 - (CVE-2016-2810) CVE-2016-2810 Mozilla: Content provider permission bypass allows malicious application to access data (MFSA 2016-41)
CVE-2016-2810 Mozilla: Content provider permission bypass allows malicious ap...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160426,repor...
: Security
Depends On:
Blocks: 1306172
  Show dependency treegraph
 
Reported: 2016-04-25 14:49 EDT by Siddharth Sharma
Modified: 2016-05-09 00:49 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-05-09 00:49:24 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Siddharth Sharma 2016-04-25 14:49:37 EDT
Security researcher Ken Okuyama reported an issue on Firefox for Android where a previously installed malicious application can access content provider permissions for Firefox in order to read data. This data includes browser history and locally saved passwords. This issue occurs when a list of permissions is defined to match those that Firefox uses for content providers and bypasses signature protections. This issue does not occur on Android 5.0 or later versions of Android.

This issue only affects Firefox for Android. Other versions and operating systems are unaffected.

External Reference:

https://www.mozilla.org/security/announce/2016/mfsa2016-41.html
Comment 1 Siddharth Sharma 2016-04-25 14:49:44 EDT
Acknowledgments:

Name: the Mozilla project
Upstream: Ken Okuyama

Note You need to log in before you can comment on or make changes to this bug.