Bug 1377565 (CVE-2016-5284) - CVE-2016-5284 Mozilla: Add-on update site certificate pin expiration (MFSA 2016-85, MFSA 2016-86)
Summary: CVE-2016-5284 Mozilla: Add-on update site certificate pin expiration (MFSA 20...
Alias: CVE-2016-5284
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1369653
TreeView+ depends on / blocked
Reported: 2016-09-20 06:22 UTC by Siddharth Sharma
Modified: 2021-02-25 17:53 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2016-10-04 02:46:11 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1912 0 normal SHIPPED_LIVE Critical: firefox security update 2016-09-21 11:47:31 UTC

Description Siddharth Sharma 2016-09-20 06:22:13 UTC
Due to flaws in the process we used to update "Preloaded Public Key Pinning" in our releases, the pinning for add-on updates became ineffective in early September. An attacker who was able to get a mis-issued certificate for a Mozilla web site could send malicious add-on updates to users on networks controlled by the attacker. Users who have not installed any add-ons are not affected.

External Reference:


Comment 1 Siddharth Sharma 2016-09-20 06:22:22 UTC

Name: the Mozilla project
Upstream: Ryan Duff

Comment 2 errata-xmlrpc 2016-09-21 07:50:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2016:1912 https://rhn.redhat.com/errata/RHSA-2016-1912.html

Note You need to log in before you can comment on or make changes to this bug.