SB2020050525 - Use-after-free in firefox-esr (Alpine package)
Published: May 5, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2020-12387)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error caused by the race condition when running shutdown code for Web Worker. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger a use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=aadba671901181be240a1d151a9f3a04f2ce3ca5
- https://git.alpinelinux.org/aports/commit/?id=37e37d549603b29c55fafcde8f3732cfb9db1640
- https://git.alpinelinux.org/aports/commit/?id=5d9ca1b5fa041ac0d09e2bd2038f505e06c7d7f5
- https://git.alpinelinux.org/aports/commit/?id=8dc0bf1501171d97e4b280f12987e24bf3cc53f7
- https://git.alpinelinux.org/aports/commit/?id=174183ffc582462ae8eaf468da032a6642e140c4
- https://git.alpinelinux.org/aports/commit/?id=397c40a2e03948882e67f7fb7053d46e6dda50d3
- https://git.alpinelinux.org/aports/commit/?id=4b76c8208fa0c29e289d14baf509b417f7c96a08
- https://git.alpinelinux.org/aports/commit/?id=c9413fd0912a1f1e6cdc9e5fd25d15f4f22cc11a
- https://git.alpinelinux.org/aports/commit/?id=1aeb9d76f321c652de13c181f2775af18eb8c42d