Bugzilla – Bug 977386
VUL-0: CVE-2016-2808: MozillaFirefox: Write to invalid HashMap entry through JavaScript.watch() (MFSA 2016-47)
Last modified: 2020-04-05 18:21:39 UTC
https://www.mozilla.org/en-US/security/advisories/mfsa2016-47/ The CESG, the Information Security Arm of GCHQ, reported that the JavaScript .watch() method could be used to overflow the 32-bit generation count of the underlying HashMap, resulting in a write to an invalid entry. Under the right conditions this write could lead to arbitrary code execution. The overflow takes considerable time and a malicious page would require a user to keep it open for the duration of the attack. null-byte written out of bounds using .watch() due to generation count overflow (CVE-2016-2808) https://bugzilla.mozilla.org/show_bug.cgi?id=1246061
An update workflow for this issue was started. This issue was rated as critical. Please submit fixed packages until 2016-04-29. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62674
bugbot adjusting priority
All submission received, incidents running
openSUSE-SU-2016:1211-1: An update that fixes 10 vulnerabilities is now available. Category: security (important) Bug References: 977333,977373,977375,977376,977379,977381,977382,977384,977386,977388 CVE References: CVE-2016-2804,CVE-2016-2806,CVE-2016-2807,CVE-2016-2808,CVE-2016-2811,CVE-2016-2812,CVE-2016-2814,CVE-2016-2816,CVE-2016-2817,CVE-2016-2820 Sources used: openSUSE Leap 42.1 (src): MozillaFirefox-46.0-21.1, mozilla-nss-3.22.3-15.2 openSUSE 13.2 (src): MozillaFirefox-46.0-68.1, mozilla-nss-3.22.3-31.1
openSUSE-SU-2016:1251-1: An update that fixes 13 vulnerabilities is now available. Category: security (moderate) Bug References: 977333,977373,977375,977376,977377,977378,977379,977380,977381,977382,977384,977386,977388 CVE References: CVE-2016-2804,CVE-2016-2806,CVE-2016-2807,CVE-2016-2808,CVE-2016-2809,CVE-2016-2810,CVE-2016-2811,CVE-2016-2812,CVE-2016-2813,CVE-2016-2814,CVE-2016-2816,CVE-2016-2817,CVE-2016-2820 Sources used: openSUSE 13.1 (src): MozillaFirefox-46.0-113.2, mozilla-nss-3.22.3-77.1
SUSE-SU-2016:1258-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 977333,977374,977376,977381,977386 CVE References: CVE-2016-2805,CVE-2016-2807,CVE-2016-2808,CVE-2016-2814 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): MozillaFirefox-38.8.0esr-66.2 SUSE Linux Enterprise Software Development Kit 12 (src): MozillaFirefox-38.8.0esr-66.2 SUSE Linux Enterprise Server 12-SP1 (src): MozillaFirefox-38.8.0esr-66.2 SUSE Linux Enterprise Server 12 (src): MozillaFirefox-38.8.0esr-66.2 SUSE Linux Enterprise Desktop 12-SP1 (src): MozillaFirefox-38.8.0esr-66.2 SUSE Linux Enterprise Desktop 12 (src): MozillaFirefox-38.8.0esr-66.2
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2016-05-18. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62716
SUSE-SU-2016:1342-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 977333,977374,977376,977381,977386 CVE References: CVE-2016-2805,CVE-2016-2807,CVE-2016-2808,CVE-2016-2814 Sources used: SUSE Linux Enterprise Server 11-SP2-LTSS (src): MozillaFirefox-38.8.0esr-40.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): MozillaFirefox-38.8.0esr-40.1
SUSE-SU-2016:1352-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 977333,977374,977376,977381,977386 CVE References: CVE-2016-2805,CVE-2016-2807,CVE-2016-2808,CVE-2016-2814 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): MozillaFirefox-38.8.0esr-0.5.1
SUSE-SU-2016:1374-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 977333,977374,977376,977381,977386 CVE References: CVE-2016-2805,CVE-2016-2807,CVE-2016-2808,CVE-2016-2814 Sources used: SUSE OpenStack Cloud 5 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Manager Proxy 2.1 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Manager 2.1 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Linux Enterprise Software Development Kit 11-SP4 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Linux Enterprise Server 11-SP4 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): MozillaFirefox-38.8.0esr-40.5, mozilla-nspr-4.12-26.1, mozilla-nss-3.20.2-30.1
released