First published: Mon Jun 13 2016(Updated: )
Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Firefox | <=46.0.1 | |
Firefox | =45.1.0 | |
Firefox | =45.1.1 | |
Debian | =8.0 | |
Firefox ESR | =45.1.0 | |
Firefox ESR | =45.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2828 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2016-2828, update Mozilla Firefox to version 47.0 or later, or update Firefox ESR to version 45.2 or later.
Affected versions of Firefox for CVE-2016-2828 include all versions prior to 47.0, as well as Firefox ESR versions before 45.2.
CVE-2016-2828 affects various Linux distributions such as Ubuntu 12.04, 14.04, 15.10, and 16.04, as well as openSUSE versions 13.1, 13.2, and 42.1.
CVE-2016-2828 exploits a use-after-free vulnerability that can occur in WebGL content, allowing attackers to access destroyed texture pools.