In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade RHEL:7
firefox
to version 0:45.3.0-1.el7_2 or higher.
This issue was patched in RHSA-2016:1551
.
Note: Versions mentioned in the description apply only to the upstream firefox
package and not the firefox
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.