[GLSA-202101-04] Mozilla Firefox: Remote code execution

Severity Normal
Affected Packages 2
Unaffected Packages 4
CVEs 1

A use-after-free in Mozilla Firefox's SCTP handling may allow remote code execution.

Background
Mozilla Firefox is a popular open-source web browser from the Mozilla
project.

Description
A use-after-free bug was discovered in Mozilla Firefox’s handling of
SCTP.

Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.

Workaround
There is no known workaround at this time.

Resolution
All Firefox ESR users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose
">=www-client/firefox-78.6.1:0/esr78"

All Firefox ESR binary users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose
">=www-client/firefox-bin-78.6.1:0/esr78"

All Firefox users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-84.0.2"

All Firefox binary users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-84.0.2"

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:ebuild/www-client/firefox?distro=gentoo www-client firefox < 84.0.2 gentoo
Unaffected pkg:ebuild/www-client/firefox?distro=gentoo www-client firefox >= 78.6.1 gentoo
Unaffected pkg:ebuild/www-client/firefox?distro=gentoo www-client firefox >= 84.0.2 gentoo
Affected pkg:ebuild/www-client/firefox-bin?distro=gentoo www-client firefox-bin < 84.0.2 gentoo
Unaffected pkg:ebuild/www-client/firefox-bin?distro=gentoo www-client firefox-bin >= 78.6.1 gentoo
Unaffected pkg:ebuild/www-client/firefox-bin?distro=gentoo www-client firefox-bin >= 84.0.2 gentoo
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...