Reachable Assertion Affecting firefox package, versions <0:68.10.0-1.0.1.el7_8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE7-FIREFOX-2559281
- published 10 Apr 2022
- disclosed 9 Jul 2020
How to fix?
Upgrade Oracle:7
firefox
to version 0:68.10.0-1.0.1.el7_8 or higher.
This issue was patched in ELSA-2020-2827
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream firefox
package and not the firefox
package as distributed by Oracle
.
See How to fix?
for Oracle:7
relevant fixed versions and status.
Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. Note: this issue only affects Firefox on ARM64 platforms. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
References
- https://linux.oracle.com/cve/CVE-2020-12417.html
- https://linux.oracle.com/errata/ELSA-2020-2827.html
- https://linux.oracle.com/errata/ELSA-2020-2828.html
- https://linux.oracle.com/errata/ELSA-2020-2906.html
- https://linux.oracle.com/errata/ELSA-2020-3038.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1640737
- https://security.gentoo.org/glsa/202007-09
- https://security.gentoo.org/glsa/202007-10
- https://usn.ubuntu.com/4421-1/
- https://www.mozilla.org/security/advisories/mfsa2020-24/
- https://www.mozilla.org/security/advisories/mfsa2020-25/
- https://www.mozilla.org/security/advisories/mfsa2020-26/